CVE Vulnerabilities

CVE-2021-3336

Improper Certificate Validation

Published: Jan 29, 2021 | Modified: Mar 04, 2021
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Wolfssl Wolfssl * 4.7.0 (excluding)
Wolfssl Ubuntu bionic *
Wolfssl Ubuntu devel *
Wolfssl Ubuntu esm-apps/bionic *
Wolfssl Ubuntu esm-apps/focal *
Wolfssl Ubuntu esm-apps/jammy *
Wolfssl Ubuntu esm-apps/noble *
Wolfssl Ubuntu esm-apps/xenial *
Wolfssl Ubuntu focal *
Wolfssl Ubuntu groovy *
Wolfssl Ubuntu hirsute *
Wolfssl Ubuntu impish *
Wolfssl Ubuntu jammy *
Wolfssl Ubuntu kinetic *
Wolfssl Ubuntu lunar *
Wolfssl Ubuntu mantic *
Wolfssl Ubuntu noble *
Wolfssl Ubuntu oracular *
Wolfssl Ubuntu trusty *
Wolfssl Ubuntu xenial *

Potential Mitigations

References