In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9855 | Issue Tracking |
Configurations
History
23 Mar 2026, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wolfssl:wolfssl:5.8.4:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/wolfSSL/wolfssl/pull/9855 - Issue Tracking | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| First Time |
Wolfssl
Wolfssl wolfssl |
19 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 20:16
Updated : 2026-03-23 18:57
NVD link : CVE-2026-3580
Mitre link : CVE-2026-3580
CVE.ORG link : CVE-2026-3580
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-203
Observable Discrepancy
