This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9734 |
|
Thu, 19 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6. | |
| Title | Fault injection attack with ML-DSA and ML-KEM on ARM | |
| Weaknesses | CWE-335 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-03-19T19:24:36.198Z
Reserved: 2026-03-03T22:56:47.976Z
Link: CVE-2026-3503
Updated: 2026-03-19T19:24:32.321Z
Status : Received
Published: 2026-03-19T19:16:20.570
Modified: 2026-03-19T19:16:20.570
Link: CVE-2026-3503
No data.
OpenCVE Enrichment
No data.