CVE-2026-5500
Description
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing bounds check in wolfSSL's PKCS7 decoder allows an MITM to truncate AES-GCM authentication tags from 16 to 1 byte, reducing tag strength to 2⁻⁸.
Root
Cause
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() fails to validate the length of the AES-GCM authentication tag, with no lower bound check. The tag length is taken directly from the message without ensuring it matches the expected 16 bytes. This allows an attacker to truncate the MAC field to a single byte.
Exploitation
An active man-in-the-middle (MITM) attacker can modify a PKCS#7 authenticated-enveloped-data message by shortening the mac field from 16 bytes to 1 byte. No other prerequisites are needed; the attacker must have network position to intercept and modify the message. The receiver will then verify only a 1-byte tag, which has only 256 possible values, making forgery trivial.
Impact
Successful exploitation reduces the security of the AES-GCM authentication from a 128-bit tag (probability of forgery 2⁻¹²⁸) to an 8-bit tag (probability 2⁻⁸). An attacker can forge a valid message with approximately 256 attempts, enabling impersonation or data tampering without detection.
Mitigation
The issue is fixed in wolfSSL via Pull Request #10102 [1], which adds proper validation of the authentication tag length. Users should update to a patched version or apply the corresponding patch. No workarounds are documented; the fix must be integrated to restore tag security.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/wolfSSL/wolfssl/pull/10102nvdIssue Tracking
News mentions
0No linked articles in our index yet.