In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
Title Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V
Weaknesses CWE-203
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-19T20:25:20.427Z

Reserved: 2026-03-05T00:16:16.057Z

Link: CVE-2026-3580

cve-icon Vulnrichment

Updated: 2026-03-19T20:25:14.415Z

cve-icon NVD

Status : Received

Published: 2026-03-19T20:16:14.450

Modified: 2026-03-19T20:16:14.450

Link: CVE-2026-3580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses