This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9734 |
|
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl wolfssl
|
|
| CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wolfssl wolfssl
|
|
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfcrypt |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfcrypt |
Thu, 19 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6. | |
| Title | Fault injection attack with ML-DSA and ML-KEM on ARM | |
| Weaknesses | CWE-335 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-03-19T19:24:36.198Z
Reserved: 2026-03-03T22:56:47.976Z
Link: CVE-2026-3503
Updated: 2026-03-19T19:24:32.321Z
Status : Analyzed
Published: 2026-03-19T19:16:20.570
Modified: 2026-04-29T17:28:53.880
Link: CVE-2026-3503
No data.
OpenCVE Enrichment
Updated: 2026-03-20T11:06:40Z