Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://https://github.com/wolfSSL/wolfssl/pull/9275 |
|
Mon, 24 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Fri, 21 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. | |
| Title | Constant Time Issue with Xtensa-based ESP32 and X22519 | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2025-11-24T15:44:21.038Z
Reserved: 2025-11-07T17:36:11.128Z
Link: CVE-2025-12888
Updated: 2025-11-24T15:43:59.787Z
Status : Awaiting Analysis
Published: 2025-11-21T23:15:44.970
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-12888
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:26Z