Advisory Database
  • Advisories
  • Dependency Scanning
  1. conan
  2. ›
  3. wolfssl
  4. ›
  5. CVE-2023-3724

CVE-2023-3724: Improper Certificate Validation

July 17, 2023 (updated July 28, 2023)

If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used.

References

  • github.com/wolfSSL/wolfssl/pull/6412
  • nvd.nist.gov/vuln/detail/CVE-2023-3724
  • www.wolfssl.com/docs/security-vulnerabilities/

Code Behaviors & Features

Detect and mitigate CVE-2023-3724 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.6.2

Fixed versions

  • 5.6.3

Solution

Upgrade to version 5.6.3 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

conan/wolfssl/CVE-2023-3724.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.