Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-0930
PUBLISHED
More InfoOfficial Page
Assigner-wolfSSL
Assigner Org ID-50d2cd11-d01a-48ed-9441-5bfce9d63b27
View Known Exploited Vulnerability (KEV) details
Published At-20 Apr, 2026 | 21:28
Updated At-21 Apr, 2026 | 13:37
Rejected At-
▼CVE Numbering Authority (CNA)
Potential wolfSSHd Buffer out-of-bounds Read on Windows Handling Terminal Resize

Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output.

Affected Products
Vendor
wolfSSL
Product
wolfSSH
Default Status
unaffected
Versions
Affected
  • From 1.4.15 before 1.5.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-126CWE-126 Buffer over-read
Type: CWE
CWE ID: CWE-126
Description: CWE-126 Buffer over-read
Metrics
VersionBase scoreBase severityVector
4.02.3LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 2.3
Base severity: LOW
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Luigino Camastra
finder
Pavel Kohout
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/wolfssl/wolfssh/pull/846
N/A
Hyperlink: https://github.com/wolfssl/wolfssh/pull/846
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found