Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9817 |
|
History
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Thu, 19 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving. | |
| Title | ECH parsing heap buffer overflow | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-03-24T01:38:13.951Z
Reserved: 2026-03-04T18:44:13.820Z
Link: CVE-2026-3549
Updated: 2026-03-24T01:38:09.221Z
Status : Awaiting Analysis
Published: 2026-03-19T21:17:12.823
Modified: 2026-03-20T13:39:46.493
Link: CVE-2026-3549
No data.
OpenCVE Enrichment
Updated: 2026-03-20T11:06:33Z