Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.
History

Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.
Title Improper key_share validation in TLS 1.3 HelloRetryRequest
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 1.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/AU:Y/R:A/V:D/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-19T20:59:54.021Z

Reserved: 2026-02-25T20:42:49.228Z

Link: CVE-2026-3230

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-19T21:17:12.483

Modified: 2026-03-19T21:17:12.483

Link: CVE-2026-3230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.