CVE-2025-11934

2.7 LOW
Published: November 21, 2025 Modified: December 03, 2025

Description

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/wolfSSL/wolfssl
Source: facts@wolfssl.com
Product
https://github.com/wolfSSL/wolfssl/pull/9113
Source: facts@wolfssl.com
Issue Tracking Patch
https://github.com/wolfSSL/wolfssl/pull/9113
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Issue Tracking Patch

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
2.7 / 10.0
EPSS (Exploit Probability)
0.0%
8th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux apple wolfssl