CVE-2026-3580 - Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V
CVE ID :CVE-2026-3580
Published : March 19, 2026, 8:16 p.m. | 45 minutes ago
Description :In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
Severity: 2.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : March 19, 2026, 8:16 p.m. | 45 minutes ago
Description :In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
Severity: 2.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...