Cyber Posture

CVE-2026-3849

Critical

Published: 19 March 2026

Published
19 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote…

more

execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 ensures timely patching of the wolfSSL library to address the specific stack buffer overflow in wc_HpkeLabeledExtract.

prevent

SI-16 implements memory protections like stack canaries and DEP to mitigate exploitation of the stack buffer overflow even if unpatched.

prevent

SI-10 enforces validation of ECH configuration inputs to prevent oversized inputs from triggering the buffer overflow in wc_HpkeLabeledExtract.

Security SummaryAI

CVE-2026-3849 is a stack buffer overflow vulnerability (CWE-787) in the wc_HpkeLabeledExtract function within wolfSSL version 5.8.4's Encrypted Client Hello (ECH) support. A maliciously crafted, oversized ECH configuration can trigger the overflow on the client side, potentially leading to remote code execution or client program crashes.

The vulnerability can be exploited by a malicious TLS server that supports ECH, targeting clients with ECH enabled via the enable-ech option. Attackers require only network access to the victim client, with no privileges, user interaction, or special conditions needed, as reflected in the CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation could allow arbitrary code execution or denial of service through crashes.

A patch addressing this issue is available in wolfSSL's GitHub pull request #9737. ECH functionality is disabled by default in wolfSSL, requiring explicit enabling, which limits exposure.

Details

CWE(s)

Affected Products

wolfssl
wolfssl
5.6.0 — 5.9.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Stack buffer overflow in client-side wolfSSL ECH processing enables remote exploitation for code execution (T1203) or application crashes causing DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References