Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3011 articles · 110772 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-5500EXPLOITED
wolfssl · wolfssl

Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass

Description

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸.

Affected Products

VendorProductVersions
wolfsslwolfssl0

References

  • https://github.com/wolfSSL/wolfssl/pull/10102

Related News (1 articles)

Tier C
VulDB4d ago
CVE-2026-5500 | wolfSSL up to 5.9.0 Authentication Tag wc_PKCS7_DecodeAuthEnvelopedData mac channel accessible
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-20
PublishedApr 10, 2026
Last enriched4d agov2
Trending Score24
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 71
NONECVE-2026-5393EXP
OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS
Trending: 56
NONECVE-2026-5187EXP
Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL
Trending: 47
NONECVE-2026-5446EXP
wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse
Trending: 47
NONECVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Updated: description, affectedVersions, severity, activelyExploited
Apr 10, 2026
Actively Exploited
Apr 10, 2026

Version History

v2
Last enriched 4d ago
v2Tier C4d ago

Updated description with new technical details, changed severity to HIGH, and added affected version 5.9.0.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v14d ago

Initial creation