Vulnerability Description
wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions (sp_256_mul_9, sp_256_sqr_9, etc.), leading to a timing side-channel that may expose sensitive cryptographic data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | 5.8.4 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/9855Issue Tracking
FAQ
What is CVE-2026-3579?
CVE-2026-3579 is a vulnerability with a CVSS score of 5.9 (MEDIUM). wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operan...
How severe is CVE-2026-3579?
CVE-2026-3579 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3579?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.