CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
ACTIVE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M
AI Score
Confidence
High
EPSS
Percentile
9.5%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
[
{
"cpes": [
"cpe:2.3:a:wolfssl:wolfssl:-:*:*:*:*:*:*:*"
],
"vendor": "wolfssl",
"product": "wolfssl",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "5.70"
}
],
"defaultStatus": "unknown"
}
]
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
ACTIVE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M
AI Score
Confidence
High
EPSS
Percentile
9.5%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial