CVE-2025-11935

With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHello containing psk_dhe_ke without a key_share extension. The re-use of an authenticated PSK connection that on the clients side unexpectedly did not have PFS, reduces the security of the connection.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-21 22:16

Updated : 2025-12-03 18:47


NVD link : CVE-2025-11935

Mitre link : CVE-2025-11935

CVE.ORG link : CVE-2025-11935


JSON object : View

Products Affected

wolfssl

  • wolfssl

linux

  • linux_kernel

apple

  • macos
CWE
CWE-326

Inadequate Encryption Strength