CVE-2025-11933

6.5 MEDIUM

📋 TL;DR

A vulnerability in wolfSSL's TLS 1.3 CKS extension parsing allows remote attackers to cause denial-of-service by sending crafted ClientHello messages with duplicate CKS extensions. This affects wolfSSL 5.8.2 and earlier on all platforms where TLS 1.3 is enabled. Systems using vulnerable versions of wolfSSL for TLS connections are at risk.

💻 Affected Systems

Products:
  • wolfSSL
Versions: 5.8.2 and earlier
Operating Systems: All platforms supported by wolfSSL
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with TLS 1.3 enabled. wolfSSL is embedded in various applications and devices; check all systems using wolfSSL for TLS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker crashes the TLS service, causing complete denial-of-service for all TLS connections on affected systems.

🟠

Likely Case

Service disruption through TLS connection failures, potentially affecting application availability that depends on TLS communication.

🟢

If Mitigated

Minimal impact with proper network controls and updated software; failed connections logged but service remains available.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing TLS services particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced compared to internet-facing services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specially crafted TLS ClientHello message with duplicate CKS extensions. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: wolfSSL 5.8.3 or later

Vendor Advisory: https://github.com/wolfSSL/wolfssl/pull/9132

Restart Required: Yes

Instructions:

1. Download wolfSSL 5.8.3 or later from official repository. 2. Replace vulnerable wolfSSL library. 3. Recompile applications using wolfSSL if statically linked. 4. Restart affected services.

🔧 Temporary Workarounds

Disable TLS 1.3

all

Disable TLS 1.3 protocol to prevent exploitation while maintaining TLS 1.2 functionality

Configure wolfSSL with --disable-tls13 or set appropriate compile-time flags

Network filtering

all

Use network controls to filter or rate-limit TLS ClientHello messages

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy intrusion prevention systems (IPS) to detect and block malicious TLS handshake patterns

🔍 How to Verify

Check if Vulnerable:

Check wolfSSL version with wolfSSL_version() or examine library files. Verify TLS 1.3 is enabled in configuration.

Check Version:

wolfssl_version or check library version in application output

Verify Fix Applied:

Confirm wolfSSL version is 5.8.3 or later and test TLS 1.3 connections remain stable under normal and malformed ClientHello conditions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected TLS handshake failures
  • wolfSSL error logs related to extension parsing
  • Service crashes during TLS negotiation

Network Indicators:

  • Multiple TLS ClientHello messages with unusual extension patterns
  • Connection resets during TLS handshake

SIEM Query:

source="*wolfssl*" AND ("handshake failure" OR "extension error" OR "CKS")

🔗 References

📤 Share & Export