Cyber Posture

CVE-2026-5447

N/A

Published: 09 April 2026

Published
09 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score N/A
EPSS Score 0.0003 9.2th percentile
Risk Priority 0 60% EPSS · 20% KEV · 20% CVSS

Description

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

Security SummaryAI

CVE-2026-5447 is a heap buffer overflow vulnerability in the wolfSSL library, specifically within the CertFromX509 function. The issue arises from incorrect size handling of the AuthorityKeyIdentifier extension during internal conversion of X.509 certificates, classified under CWE-122.

An attacker capable of supplying a malicious X.509 certificate to an application using the affected wolfSSL component can trigger the heap buffer overflow during certificate processing.

The wolfSSL project has released a fix for this vulnerability via pull request #10112 on GitHub, which corrects the size handling of the AuthorityKeyIdentifier extension. Security practitioners should apply this patch to mitigate the issue.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Heap buffer overflow in X.509 cert parsing enables remote code execution via malicious certificate supply, directly facilitating exploitation against public-facing apps (T1190), client-side execution (T1203), or privilege escalation (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References