{"id":"CVE-2015-6925","details":"wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.","modified":"2026-04-10T03:46:26.704881Z","published":"2016-01-22T15:59:03Z","references":[{"type":"ADVISORY","url":"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"},{"type":"EVIDENCE","url":"https://github.com/IAIK/wolfSSL-DoS"},{"type":"EVIDENCE","url":"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"},{"type":"WEB","url":"http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}