VYPR
Unrated severityNVD Advisory· Published Nov 21, 2025· Updated Dec 8, 2025

Potential DoS Vulnerability through Multiple KeyShareEntry with Same Group in TLS 1.3 ClientHello

CVE-2025-11936

Description

Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing.

Affected products

2
  • WolfSSL/Wolfsslllm-fuzzy2 versions
    =5.8.2+ 1 more
    • (no CPE)range: =5.8.2
    • (no CPE)range: 3.12.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.