CVE-2026-3580 PUBLISHED

Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V

Assigner: wolfSSL
Reserved: 05.03.2026 Published: 19.03.2026 Updated: 19.03.2026

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
CVSS Score: 2.1

Product Status

Vendor wolfSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 0 to 5.9.0 (excl.)

Credits

  • Wind Wong finder

References

Problem Types

  • CWE-203 Observable Discrepancy CWE