Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2896 articles · 109737 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5446EXPLOITEDPATCHED
wolfssl · wolfssl

wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse

Description

In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the MagicCrypto SDK with no internal counter, and because the explicit IV is zero-initialized at session setup and never incremented in non-FIPS builds. This vulnerability affects wolfSSL builds configured with --enable-aria and the proprietary MagicCrypto SDK (a non-default, opt-in configuration required for Korean regulatory deployments). AES-GCM is not affected because wc_AesGcmEncrypt_ex maintains an internal invocation counter independently of the call-site guard.

Affected Products

VendorProductVersions
wolfsslwolfssl5.2.1, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10111

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-5446 | wolfSSL up to 5.9.0 wc_AriaEncrypt nonce re-use
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5.9.1
CWECWE-323
PublishedApr 9, 2026
Last enriched5h agov2
Tags
CVE-2026-5446
Trending Score49
Source articles1
Independent1
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 49
CRITICALCVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 49
CRITICALCVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 49
CRITICALCVE-2026-5503EXP
out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026
Actively Exploited
Apr 9, 2026
Patch Available
Apr 9, 2026
Updated: severity, affectedVersions, activelyExploited, tags
Apr 10, 2026

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated severity to CRITICAL, added affected version 5.9.0, and noted that the vulnerability is actively exploited.

severityaffectedVersionsactivelyExploitedtags
via VulDB
v113h ago

Initial creation