First published: Fri Aug 21 2020(Updated: )
An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WolfSSL wolfssl | <4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24585 is a vulnerability that exists in the DTLS handshake implementation in wolfSSL before version 4.5.0.
The severity of CVE-2020-24585 is medium, with a CVSS score of 5.3.
CVE-2020-24585 affects wolfSSL versions up to, but not including, version 4.5.0.
To fix CVE-2020-24585, you should update wolfSSL to version 4.5.0 or later.
You can find more information about CVE-2020-24585 in the references provided: https://github.com/wolfSSL/wolfssl/pull/3219, https://github.com/wolfSSL/wolfssl/releases/tag/v4.5.0-stable