CVE-2025-12888

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:5.8.2:*:*:*:*:*:*:*

History

04 Dec 2025, 16:07

Type Values Removed Values Added
First Time Wolfssl
Wolfssl wolfssl
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://https://github.com/wolfSSL/wolfssl/pull/9275 - () https://https://github.com/wolfSSL/wolfssl/pull/9275 - Broken Link
CPE cpe:2.3:a:wolfssl:wolfssl:5.8.2:*:*:*:*:*:*:*

21 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-21 23:15

Updated : 2025-12-04 16:07


NVD link : CVE-2025-12888

Mitre link : CVE-2025-12888

CVE.ORG link : CVE-2025-12888


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-203

Observable Discrepancy