CVE-2020-24613

wolfSSL before 4.5.0 mishandles TLS 1.3 server data in the WAIT_CERT_CR state, within SanityCheckTls13MsgReceived() in tls13.c. This is an incorrect implementation of the TLS 1.3 client state machine. This allows attackers in a privileged network position to completely impersonate any TLS 1.3 servers, and read or modify potentially sensitive information between clients using the wolfSSL library and these TLS servers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-08-24 22:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-24613

Mitre link : CVE-2020-24613

CVE.ORG link : CVE-2020-24613


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-295

Improper Certificate Validation