Join us on January 21 at 9:00 AM PT for Getting Started with wolfSSH, a technical webinar presented by Jacob Barthelmeh, Senior Software Engineer at wolfSSL. This session introduces the SSH protocol and explains how wolfSSH provides a secure, lightweight SSH implementation designed for performance, portability, and resource-constrained embedded systems. Register Now: Getting Started with […]
Read MoreMore TagCategory: Uncategorized
ML-DSA OpenSSL Interoperability
The latest enhancement to wolfSSL’s ML-DSA (Module-Lattice-Based Digital Signature Algorithm) implementation solidifies interoperability with OpenSSL-generated cryptographic keys. This update introduces support for importing ML-DSA private keys that have been encoded using OpenSSL’s DER format. The new functionality extends the ASN.1 parsing logic to recognize and correctly decode an ASN.1 encoding structure that OpenSSL uses for […]
Read MoreMore TagwolfTPM – Add TPM 2.0 v1.85 PQC Post-Quantum Support
As the cybersecurity landscape prepares for the advent of quantum computing, the Trusted Platform Module (TPM) ecosystem is evolving to meet these new challenges. wolfSSL is proud to announce that wolfTPM now includes initial support for the TPM 2.0 Library Specification v1.85, bringing Post-Quantum Cryptography (PQC) capabilities to your hardware-backed security workflows. This update introduces […]
Read MoreMore TagVulnerability Disclosure: wolfSSL CVE-2025-7394
Affected Users: Applications using wolfSSL’s OpenSSL compatibility layer before wolfSSL version 5.8.2 that call both RAND_bytes() and fork() operations. This does not affect internal TLS operations or applications that do not explicitly use RAND_bytes(). Summary: A vulnerability was discovered in wolfSSL’s OpenSSL compatibility layer where the RAND_poll() function was not behaving as expected, leading to […]
Read MoreMore TagVulnerability Disclosure: wolfSSL Fault Injection Attack on ECC and Ed25519 Verify Operations
Affected Users: Users performing ECC or Ed25519 signature verification operations on devices that may be susceptible to fault injection attacks, particularly in security-critical applications such as secure boot implementations. Summary: A potential vulnerability to fault injection attacks was identified in wolfSSL’s ECC and Ed25519 signature verification operations. Fault injection is a sophisticated physical attack technique […]
Read MoreMore TagwolfSSH v1.4.22 Release
Look at that! wolfSSH had another release. New year, new version. Welcome to wolfSSH v1.4.22. This is mainly a bug fix release. We’ve improved interoperability with other implementations of SSH. We’ve improved the build process with several IDEs, Zephyr, and LwIP. We also added an SFTP client example for the Renesas RX72N platform. There is […]
Read MoreMore TagGetting Started with wolfSSL – Part 2: Configuration, Embedded Porting, and Advanced TLS Features
Learn how to configure, extend, and troubleshoot secure TLS applications with wolfSSL. Following Part 1 of our Getting Started with wolfSSL webinar series, Part 2 dives deeper into the topics developers encounter once basic TLS integration is complete. This session focuses on configuration, embedded deployment, and advanced TLS features used in real-world systems. Led by […]
Read MoreMore TagVulnerability Disclosure: wolfSSH CVE-2025-11624
Affected Users: wolfSSH with SFTP enabled on the server side before version 1.4.21. Summary: A stack overflow vulnerability was discovered in wolfSSH’s SFTP server implementation. After an SFTP connection is established, a malicious SFTP client could send a specially crafted read, write, or set state SFTP packet that would cause the SFTP server code to […]
Read MoreMore TagBringing FIPS 140-3 to Proxmox Virtual Environments with wolfCrypt-FIPS
Organizations in government, healthcare, finance, and critical infrastructure sectors are required to meet stringent compliance standards, and FIPS 140-3 certification has become a key requirement for cryptographic modules used in regulated environments. wolfSSL is uniquely positioned to help bring this level of certification to Proxmox Virtual Environment (PVE), one of the most popular open-source virtualization […]
Read MoreMore TagThe DEADBEEF RNG Example Revisited
A while ago we had made a blog post and a patch that showed how someone could integrate their new RNG (Random Number Generator) into our wolfCrypt library. That methodology works, but it has a fairly obvious flaw. It assumed your RNG included the DRBG (Deterministic Random Bit Generator) as part of its implementation. You […]
Read MoreMore Tag
