Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.
This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9734 | Issue Tracking Patch |
Configurations
History
29 Apr 2026, 17:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.2 |
| First Time |
Wolfssl
Wolfssl wolfssl |
|
| CPE | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/wolfSSL/wolfssl/pull/9734 - Issue Tracking, Patch |
19 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 19:16
Updated : 2026-04-29 17:28
NVD link : CVE-2026-3503
Mitre link : CVE-2026-3503
CVE.ORG link : CVE-2026-3503
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
