CVE-2025-11934

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-21 23:15

Updated : 2025-12-03 18:47


NVD link : CVE-2025-11934

Mitre link : CVE-2025-11934

CVE.ORG link : CVE-2025-11934


JSON object : View

Products Affected

wolfssl

  • wolfssl

linux

  • linux_kernel

apple

  • macos
CWE
CWE-20

Improper Input Validation