Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2881 articles · 109723 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5194EXPLOITEDPATCHED
wolfssl · wolfssl

wolfSSL ECDSA Certificate Verification

Description

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.

Affected Products

VendorProductVersions
wolfsslwolfssl3.12.0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10131(patch)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-5194 | wolfSSL up to 5.9.0 Hash/Digest certificate validation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5.9.1
CWECWE-295
PublishedApr 9, 2026
Last enriched4h agov2
Tags
CVE-2026-5194
Trending Score49
Source articles1
Independent1
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 50
CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 49
CRITICALCVE-2026-5503EXP
out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
Trending: 49
CRITICALCVE-2026-5188EXP
Integer underflow in X.509 SAN parsing in wolfSSL
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Actively Exploited
Apr 9, 2026
Patch Available
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026
Updated: severity, affectedVersions, activelyExploited, tags
Apr 10, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, added affected version 5.9.0, and noted that the vulnerability is actively exploited.

severityaffectedVersionsactivelyExploitedtags
via VulDB
v112h ago

Initial creation