xiand.ai
Apr 14, 2026 · Updated 07:32 AM UTC
Cybersecurity

Critical wolfSSL flaw allows attackers to use forged certificates

A cryptographic validation error in the widely used wolfSSL library could allow attackers to trick devices into trusting malicious servers.

Ryan Torres

2 min read

Critical wolfSSL flaw allows attackers to use forged certificates
Cybersecurity server room

A critical vulnerability in the wolfSSL library enables attackers to use forged certificates to bypass security checks on billions of devices. The flaw, tracked as CVE-2026-5194, stems from improper verification of hash algorithm sizes during ECDSA signature checks.

Researchers warn that the bug allows an attacker to force a target application or device to accept fraudulent certificates for malicious connections. Because wolfSSL is used in over 5 billion applications—including IoT devices, industrial control systems, and automotive software—the potential attack surface is massive.

Nicholas Carlini of Anthropic discovered the vulnerability. The flaw affects several signature algorithms, including ECDSA/ECC, DSA, ML-DSA, Ed25519, and Ed448.

Forged digital identities

According to the wolfSSL security advisory, the library fails to perform necessary checks on the hash/digest size and Object Identifier (OID). This allows digests smaller than the cryptographically required size to be accepted during verification.

"This could lead to reduced security of ECDSA certificate-based authentication if the public CA [certificate authority] key used is also known," the advisory stated.

Security researcher Lukasz Olejnik noted that exploitation could trick vulnerable systems into accepting a "forged digital identity as genuine." This could lead a device to trust a malicious server, file, or connection that should have been rejected.

An attacker can exploit this by providing a forged certificate with a smaller digest than is appropriate for the key type. This makes the signature much easier to falsify or reproduce.

WolfSSL released version 5.9.1 on April 8 to address the issue. Developers and system administrators using builds with both ECC and EdDSA or ML-DSA active should upgrade immediately.

Administrators relying on downstream vendor packages, such as Linux distribution updates or embedded SDKs, should monitor vendor-specific advisories for patches. Red Hat has already issued an advisory regarding the flaw, noting that its MariaDB implementation is not affected because it utilizes OpenSSL instead of wolfSSL.

Comments

Comments are stored locally in your browser.