CVE-2026-0930
Out-of-Bounds Read in wolfSSHd Windows Terminal Resize Leak
Publication date: 2026-04-20
Last updated on: 2026-04-24
Assigner: wolfSSL Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wolfssh | wolfssh | From 1.4.15 (inc) to 1.5.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
| CWE-126 | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is that an authenticated user could access memory adjacent to the stack, potentially leaking sensitive information through the pseudo-console output. This could lead to unintended disclosure of data that resides in the adjacent stack memory.
Can you explain this vulnerability to me?
This vulnerability involves a potential out of bounds read in wolfSSHd on Windows when handling a terminal resize request. An authenticated user who has established a connection can trigger this out of bounds read, which causes adjacent stack memory to be leaked to the pseudo-console output.