In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
History

Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
Title Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V
Weaknesses CWE-203
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-03-19T20:25:20.427Z

Reserved: 2026-03-05T00:16:16.057Z

Link: CVE-2026-3580

cve-icon Vulnrichment

Updated: 2026-03-19T20:25:14.415Z

cve-icon NVD

Status : Received

Published: 2026-03-19T20:16:14.450

Modified: 2026-03-19T20:16:14.450

Link: CVE-2026-3580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.