CVE-2026-5447
Published: 09 April 2026
Description
Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
Security SummaryAI
CVE-2026-5447 is a heap buffer overflow vulnerability in the wolfSSL library, specifically within the CertFromX509 function. The issue arises from incorrect size handling of the AuthorityKeyIdentifier extension during internal conversion of X.509 certificates, classified under CWE-122.
An attacker capable of supplying a malicious X.509 certificate to an application using the affected wolfSSL component can trigger the heap buffer overflow during certificate processing.
The wolfSSL project has released a fix for this vulnerability via pull request #10112 on GitHub, which corrects the size handling of the AuthorityKeyIdentifier extension. Security practitioners should apply this patch to mitigate the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in X.509 cert parsing enables remote code execution via malicious certificate supply, directly facilitating exploitation against public-facing apps (T1190), client-side execution (T1203), or privilege escalation (T1068).