CVE-2026-3579

wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions (sp_256_mul_9, sp_256_sqr_9, etc.), leading to a timing side-channel that may expose sensitive cryptographic data.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/9855 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:5.8.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-19 20:16

Updated : 2026-03-23 18:56


NVD link : CVE-2026-3579

Mitre link : CVE-2026-3579

CVE.ORG link : CVE-2026-3579


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-203

Observable Discrepancy