Cyber Posture

CVE-2026-3549

Critical

Published: 19 March 2026

Published
19 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3549 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Wolfssl Wolfssl. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates identifying, prioritizing, and patching flaws like the integer underflow in wolfSSL's ECH parsing to prevent heap overflows.

prevent

Enforces least functionality by prohibiting unnecessary features like ECH in wolfSSL, eliminating the vulnerable parsing path since ECH is off by default.

prevent

Implements memory protections such as ASLR and DEP to mitigate exploitation of heap overflows from malformed ECH extensions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Remote unauthenticated heap overflow in TLS ECH parsing enables arbitrary code execution on network-exposed servers using vulnerable wolfSSL (ECH-enabled), directly mapping to exploitation of public-facing applications and remote services.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by…

more

default, and the ECH standard is still evolving.

Deeper analysisAI

CVE-2026-3549 is a heap overflow vulnerability in the wolfSSL library's TLS 1.3 Encrypted Client Hello (ECH) parsing logic. An integer underflow occurs when calculating a buffer length during ECH extension parsing, leading to writing beyond the bounds of an allocated buffer. This affects wolfSSL implementations where ECH is enabled, though ECH is disabled by default in wolfSSL, and the ECH standard remains under development.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation could result in high-impact consequences, including arbitrary code execution, data disclosure, or system compromise through the heap overflow (CWE-122).

Mitigation is addressed in a wolfSSL GitHub pull request at https://github.com/wolfSSL/wolfssl/pull/9817, which fixes the integer underflow in ECH parsing. Security practitioners should update to the patched version and ensure ECH remains disabled unless explicitly required.

Notable context includes that ECH is off by default in wolfSSL, reducing exposure, and no real-world exploitation has been reported as of the CVE publication on 2026-03-19.

Details

CWE(s)

Affected Products

wolfssl
wolfssl
≤ 5.9.0

CVEs Like This One

CVE-2026-4395Same product: Wolfssl Wolfssl
CVE-2026-5187Same product: Wolfssl Wolfssl
CVE-2026-5503Same product: Wolfssl Wolfssl
CVE-2026-5501Same product: Wolfssl Wolfssl
CVE-2026-3547Same product: Wolfssl Wolfssl
CVE-2026-5477Same product: Wolfssl Wolfssl
CVE-2026-5194Same product: Wolfssl Wolfssl
CVE-2026-3849Same product: Wolfssl Wolfssl
CVE-2026-5500Same product: Wolfssl Wolfssl
CVE-2025-47981Shared CWE-122

References