Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2894 articles · 109731 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5503EXPLOITED
wolfssl · wolfssl

out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName

Description

A vulnerability was found in wolfSSL up to 5.9.0. It has been rated as critical. Impacted is the function TLSX_EchChangeSNI of the component ClientHello Handler. This manipulation causes out-of-bounds write. This vulnerability appears as CVE-2026-5503. The attack may be initiated remotely. There is no available exploit. It is suggested to install a patch to address this issue.

Affected Products

VendorProductVersions
wolfsslwolfssl0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10102

Related News (1 articles)

Tier C
VulDB6h ago
CVE-2026-5503 | wolfSSL up to 5.9.0 ClientHello TLSX_EchChangeSNI out-of-bounds write
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-787
PublishedApr 9, 2026
Last enriched5h agov2
Trending Score49
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 49
CRITICALCVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 49
CRITICALCVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 49
CRITICALCVE-2026-5188EXP
Integer underflow in X.509 SAN parsing in wolfSSL
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026
Actively Exploited
Apr 9, 2026
Updated: description, affectedVersions, severity, activelyExploited
Apr 10, 2026

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated description with critical severity, added affected version 5.9.0, and noted that the vulnerability is actively exploited.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v110h ago

Initial creation