VYPR
Medium severity5.9NVD Advisory· Published Apr 10, 2026· Updated Apr 27, 2026

CVE-2026-5500

CVE-2026-5500

Description

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing bounds check in wolfSSL's PKCS7 decoder allows an MITM to truncate AES-GCM authentication tags from 16 to 1 byte, reducing tag strength to 2⁻⁸.

Root

Cause

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() fails to validate the length of the AES-GCM authentication tag, with no lower bound check. The tag length is taken directly from the message without ensuring it matches the expected 16 bytes. This allows an attacker to truncate the MAC field to a single byte.

Exploitation

An active man-in-the-middle (MITM) attacker can modify a PKCS#7 authenticated-enveloped-data message by shortening the mac field from 16 bytes to 1 byte. No other prerequisites are needed; the attacker must have network position to intercept and modify the message. The receiver will then verify only a 1-byte tag, which has only 256 possible values, making forgery trivial.

Impact

Successful exploitation reduces the security of the AES-GCM authentication from a 128-bit tag (probability of forgery 2⁻¹²⁸) to an 8-bit tag (probability 2⁻⁸). An attacker can forge a valid message with approximately 256 attempts, enabling impersonation or data tampering without detection.

Mitigation

The issue is fixed in wolfSSL via Pull Request #10102 [1], which adds proper validation of the authentication tag length. Users should update to a patched version or apply the corresponding patch. No workarounds are documented; the fix must be integrated to restore tag security.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • WolfSSL/Wolfssl2 versions
    cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*range: <=5.9.0
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.