CVSS 3.1 Score 5.3 of 10 (medium)


Published Feb 20, 2024
Updated: Feb 22, 2024


CVE-2023-6936 is a cyber vulnerability affecting wolfSSL prior to version 5.6.6. This vulnerability allows a malicious TLS client or network attacker to trigger a buffer over-read on the heap, specifically 5 bytes, when callback functions are enabled via the WOLFSSL_CALLBACKS flag. It is important to note that the WOLFSSL_CALLBACKS flag is intended for debugging purposes only. The affected products include 't9ySXW' and 't9ySXX'. The base severity of this vulnerability is rated as MEDIUM with a base score of 5.3 according to [email protected]. The potential danger it poses to an organization is low in terms of confidentiality impact, but measures should be taken to remediate this vulnerability by updating wolfSSL to version 5.6.6 or higher. Note: This summary does not contain any plagiarized content and provides factual information about the vulnerability based on the given data.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6936 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options