Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-5500— Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-5500

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
wolfSSL(CyaSSL) 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
wolfSSL(CyaSSL)是美国wolfSSL公司的一个针对嵌入式系统开发人员使用的小的、可移植的嵌入式SSL编程库。 wolfSSL(CyaSSL)存在安全漏洞,该漏洞源于wc_PKCS7_DecodeAuthEnvelopedData函数未正确清理接收的AES-GCM身份验证标签长度且缺少下限检查,可能导致中间人攻击者将mac字段从16字节截断至1字节,从而降低标签检查强度。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
wolfSSLwolfSSL 0 ~ 5.9.0 -

II. Public POCs for CVE-2026-5500

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-5500

登录查看更多情报信息。

Same Patch Batch · wolfSSL · 2026-04-10 · 6 CVEs total

CVE-2026-5479wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag
CVE-2026-5188Integer underflow in X.509 SAN parsing in wolfSSL
CVE-2026-5466wc_VerifyEccsiHash missing sanity check
CVE-2026-5501Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf C
CVE-2026-5477Prefix-substitution forgery via integer overflow in wolfCrypt CMAC

IV. Related Vulnerabilities

V. Comments for CVE-2026-5500

No comments yet


Leave a comment