CVE-2026-3503

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/9734 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

29 Apr 2026, 17:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.2
First Time Wolfssl
Wolfssl wolfssl
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
Summary
  • (es) Falla del mecanismo de protección en las implementaciones post-cuánticas de wolfCrypt (ML-KEM y ML-DSA) en wolfSSL en microcontroladores ARM Cortex-M permite a un atacante físico comprometer material de clave y/o resultados criptográficos a través de fallas transitorias inducidas que corrompen o redirigen valores de semilla/puntero durante la expansión basada en Keccak. Este problema afecta a wolfSSL (wolfCrypt): hash de commit d86575c766e6e67ef93545fa69c04d6eb49400c6.
References () https://github.com/wolfSSL/wolfssl/pull/9734 - () https://github.com/wolfSSL/wolfssl/pull/9734 - Issue Tracking, Patch

19 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 19:16

Updated : 2026-04-29 17:28


NVD link : CVE-2026-3503

Mitre link : CVE-2026-3503

CVE.ORG link : CVE-2026-3503


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)