CVE-2020-24613

wolfSSL before 4.5.0 mishandles TLS 1.3 server data in the WAIT_CERT_CR state, within SanityCheckTls13MsgReceived() in tls13.c. This is an incorrect implementation of the TLS 1.3 client state machine. This allows attackers in a privileged network position to completely impersonate any TLS 1.3 servers, and read or modify potentially sensitive information between clients using the wolfSSL library and these TLS servers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:15

Type Values Removed Values Added
References () https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/ - Exploit, Third Party Advisory () https://research.nccgroup.com/2020/08/24/technical-advisory-wolfssl-tls-1-3-client-man-in-the-middle-attack/ - Exploit, Third Party Advisory

Information

Published : 2020-08-24 22:15

Updated : 2024-11-21 05:15


NVD link : CVE-2020-24613

Mitre link : CVE-2020-24613

CVE.ORG link : CVE-2020-24613


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-295

Improper Certificate Validation