CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “matrixssl”

11 vulnerabilities found for “matrixssl”

CVE-2023-24609
HIGH7.5

Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.

matrixssl / matrixssl+1
Network
Published Dec 22, 2023
CVE-2022-46505
HIGH7.5

An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.

matrixssl / matrixssl
Network
Published Jan 18, 2023
CVE-2022-43974
HIGH8.1

MatrixSSL 4.0.4 through 4.5.1 has an integer overflow in matrixSslDecodeTls13. A remote attacker might be able to send a crafted TLS Message to cause a buffer overflow and achieve remote code execution. This is fixed in 4.6.0.

matrixssl / matrixssl
Network
Published Jan 9, 2023
CVE-2019-16747
HIGH7.5

In MatrixSSL before 4.2.2 Open, the DTLS server can encounter an invalid pointer free (leading to memory corruption and a daemon crash) via a crafted incoming network message, a different vulnerability than CVE-2019-14431.

matrixssl / matrixssl
Network
Published Dec 30, 2020
CVE-2019-13629
MEDIUM5.9

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

matrixssl / matrixssl
Network
Published Oct 3, 2019
CVE-2019-14431
CRITICAL9.8

In MatrixSSL 3.8.3 Open through 4.2.1 Open, the DTLS server mishandles incoming network messages leading to a heap-based buffer overflow of up to 256 bytes and possible Remote Code Execution in parseSSLHandshake in sslDecode.c. During processing of a crafted packet, the server mishandles the fragment length value provided in the DTLS message.

matrixssl / matrixssl
Network
Published Jul 29, 2019
CVE-2019-13470
CRITICAL9.8

MatrixSSL before 4.2.1 has an out-of-bounds read during ASN.1 handling.

matrixssl / matrixssl
Network
Published Jul 9, 2019
CVE-2019-10914
CRITICAL9.8

pubRsaDecryptSignedElementExt in MatrixSSL 4.0.1 Open, as used in Inside Secure TLS Toolkit, has a stack-based buffer overflow during X.509 certificate verification because of missing validation in psRsaDecryptPubExt in crypto/pubkey/rsa_pub.c.

matrixssl / matrixssl
Network
Published Apr 8, 2019
CVE-2018-12439
MEDIUM4.7

MatrixSSL through 3.9.5 Open allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

matrixssl / matrixssl
Local
Published Jun 15, 2018
CVE-2017-1000417
MEDIUM5.3

MatrixSSL version 3.7.2 adopts a collision-prone OID comparison logic resulting in possible spoofing of OIDs (e.g. in ExtKeyUsage extension) on X.509 certificates.

matrixssl / matrixssl
Network
Published Jan 22, 2018
CVE-2017-1000415
MEDIUM5.9

MatrixSSL version 3.7.2 has an incorrect UTCTime date range validation in its X.509 certificate validation process resulting in some certificates have their expiration (beginning) year extended (delayed) by 100 years.

matrixssl / matrixssl
Network
Published Jan 9, 2018