Vulnerability Description
In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | 5.8.4 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/9855Issue Tracking
FAQ
What is CVE-2026-3580?
CVE-2026-3580 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-c...
How severe is CVE-2026-3580?
CVE-2026-3580 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3580?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.