wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/wolfssl/wolfssl/pull/10102 |
|
History
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Fri, 10 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants. | |
| Title | wc_VerifyEccsiHash missing sanity check | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-10T03:00:42.976Z
Reserved: 2026-04-03T07:07:31.067Z
Link: CVE-2026-5466
No data.
Status : Received
Published: 2026-04-10T04:17:16.420
Modified: 2026-04-10T04:17:16.420
Link: CVE-2026-5466
No data.
OpenCVE Enrichment
Updated: 2026-04-10T08:35:55Z
Weaknesses