Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2894 articles · 109731 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5477EXPLOITED
wolfssl · wolfssl

Prefix-substitution forgery via integer overflow in wolfCrypt CMAC

Description

An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where digest is all-zeros and the XOR is a no-op). However, totalSz is word32 and wraps to zero after 2^28 block flushes (4 GiB), causing the guard to erroneously discard the live CBC-MAC chain state. Any two messages sharing a common suffix beyond the 4 GiB mark then produce identical CMAC tags, enabling a zero-work prefix-substitution forgery. The fix removes the guard, making the XOR unconditional; the no-op property on the first block is preserved because digest is zero-initialized by wc_InitCmac_ex.

Affected Products

VendorProductVersions
wolfsslwolfssl0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10102

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-5477 | wolfSSL up to 5.9.0 Message wc_CmacUpdate integer overflow
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-190
PublishedApr 10, 2026
Last enriched3h agov2
Trending Score49
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 49
CRITICALCVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 49
CRITICALCVE-2026-5503EXP
out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
Trending: 49
CRITICALCVE-2026-5188EXP
Integer underflow in X.509 SAN parsing in wolfSSL
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Actively Exploited
Apr 10, 2026
Updated: affectedVersions, severity, activelyExploited
Apr 10, 2026

Version History

v2
Last enriched 3h ago
v2Tier C3h ago

Updated affected versions to include 5.9.0, changed severity to CRITICAL, and noted that there is no exploit available.

affectedVersionsseverityactivelyExploited
via VulDB
v13h ago

Initial creation