VYPR
Unrated severityNVD Advisory· Published Mar 19, 2026· Updated Mar 19, 2026

Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V

CVE-2026-3580

Description

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.

Affected products

2
  • WolfSSL/Wolfsslllm-fuzzy2 versions
    = 5.8.4+ 1 more
    • (no CPE)range: = 5.8.4
    • (no CPE)range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.