Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.
This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9734 |
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-19 19:16
Updated : 2026-03-20 13:39
NVD link : CVE-2026-3503
Mitre link : CVE-2026-3503
CVE.ORG link : CVE-2026-3503
JSON object : View
Products Affected
No product.
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
