CVE-2022-39173
NixOS vulnerability analysis and mitigation

Overview

In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake when attempting to resume a previous TLS session. The vulnerability (CVE-2022-39173) was discovered by Max at Trail of Bits and Lucca Hirschi from LORIA, Inria, France using the tlspuffin tool. This issue affects TLS 1.3 servers with session ticket resumption enabled (Trail of Bits Blog, CVE Details).

Technical details

The buffer overflow occurs in the RefineSuites function when processing cipher suites during a resumed TLS 1.3 handshake. The vulnerability is triggered when a malicious client sends two specially crafted Client Hello messages containing duplicate cipher suites: one pretending to resume a previous session, and another in response to a Hello Retry Request. If the Client Hellos contain at least 13 duplicate cipher suites (but less than 150 total), the second invocation of RefineSuites can write beyond the allocated buffer size of WOLFSSL_MAX_SUITE_SZ (300 bytes). An overflow of up to 44,700 bytes has been confirmed (Trail of Bits Blog).

Impact

The vulnerability allows malicious clients to cause a buffer overflow on TLS 1.3 servers, potentially leading to denial of service. While the potential for remote code execution exists on certain architectures or targets, this has not been confirmed. The overflow can overwrite large portions of the stack, including return addresses (wolfSSL Security).

Mitigation and workarounds

Users running TLS 1.3 servers with session ticket resumption enabled should update to wolfSSL version 5.5.1 or later to address this vulnerability. The issue was fixed in version 5.5.1 released in September 2022 (wolfSSL Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026
CVE-2026-22184MEDIUM4.6
  • NixOSNixOS
  • java-1.8.0-openjdk-demo
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management