CVE-2026-3580

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/9855 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:5.8.4:*:*:*:*:*:*:*

History

23 Mar 2026, 18:57

Type Values Removed Values Added
CPE cpe:2.3:a:wolfssl:wolfssl:5.8.4:*:*:*:*:*:*:*
Summary
  • (es) En wolfSSL 5.8.4, la lógica de enmascaramiento de tiempo constante en sp_256_get_entry_256_9 se optimiza en bifurcaciones condicionales (bnez) por GCC al apuntar a RISC-V RV32I con -O3. Esta transformación rompe la resistencia a ataques de canal lateral de la multiplicación escalar ECC, lo que podría permitir a un atacante local recuperar claves secretas mediante análisis de tiempos.
References () https://github.com/wolfSSL/wolfssl/pull/9855 - () https://github.com/wolfSSL/wolfssl/pull/9855 - Issue Tracking
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
First Time Wolfssl
Wolfssl wolfssl

19 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 20:16

Updated : 2026-03-23 18:57


NVD link : CVE-2026-3580

Mitre link : CVE-2026-3580

CVE.ORG link : CVE-2026-3580


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-203

Observable Discrepancy