Cyber Posture

CVE-2026-3849

Critical

Published: 19 March 2026

Published
19 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3849 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Wolfssl Wolfssl. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 44.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 ensures timely patching of the wolfSSL library to address the specific stack buffer overflow in wc_HpkeLabeledExtract.

prevent

SI-16 implements memory protections like stack canaries and DEP to mitigate exploitation of the stack buffer overflow even if unpatched.

prevent

SI-10 enforces validation of ECH configuration inputs to prevent oversized inputs from triggering the buffer overflow in wc_HpkeLabeledExtract.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Stack buffer overflow in client-side wolfSSL ECH processing enables remote exploitation for code execution (T1203) or application crashes causing DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote…

more

execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech.

Deeper analysisAI

CVE-2026-3849 is a stack buffer overflow vulnerability (CWE-787) in the wc_HpkeLabeledExtract function within wolfSSL version 5.8.4's Encrypted Client Hello (ECH) support. A maliciously crafted, oversized ECH configuration can trigger the overflow on the client side, potentially leading to remote code execution or client program crashes.

The vulnerability can be exploited by a malicious TLS server that supports ECH, targeting clients with ECH enabled via the enable-ech option. Attackers require only network access to the victim client, with no privileges, user interaction, or special conditions needed, as reflected in the CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation could allow arbitrary code execution or denial of service through crashes.

A patch addressing this issue is available in wolfSSL's GitHub pull request #9737. ECH functionality is disabled by default in wolfSSL, requiring explicit enabling, which limits exposure.

Details

CWE(s)

Affected Products

wolfssl
wolfssl
5.6.0 — 5.9.0

CVEs Like This One

CVE-2026-5503Same product: Wolfssl Wolfssl
CVE-2026-5187Same product: Wolfssl Wolfssl
CVE-2026-3547Same product: Wolfssl Wolfssl
CVE-2026-5500Same product: Wolfssl Wolfssl
CVE-2026-3549Same product: Wolfssl Wolfssl
CVE-2026-4395Same product: Wolfssl Wolfssl
CVE-2026-5477Same product: Wolfssl Wolfssl
CVE-2026-5501Same product: Wolfssl Wolfssl
CVE-2026-5194Same product: Wolfssl Wolfssl
CVE-2025-15467Shared CWE-787

References