| Summary | A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500 |
|---|---|
| Publication Date | Aug. 28, 2024, 4:15 a.m. |
| Registration Date | Aug. 28, 2024, noon |
| Last Update | Aug. 28, 2024, 9:57 p.m. |
| Title | wolfSSL Inc. の wolfSSL におけるアクセス制御に関する脆弱性 |
|---|---|
| Summary | wolfSSL Inc. の wolfSSL には、アクセス制御に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される可能性があります。 |
| Solution | 参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 27, 2024, midnight |
| Registration Date | Dec. 9, 2025, 10:50 a.m. |
| Last Update | Dec. 9, 2025, 10:50 a.m. |
| wolfSSL Inc. |
| wolfSSL 5.7.0 およびそれ以前 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年12月09日] 掲載 |
Dec. 9, 2025, 10:50 a.m. |