Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-3580

In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.9%
CVSS Severity
CVSS v3 Score 4.7
Products affected by CVE-2026-3580
  • Wolfssl » Wolfssl » Version: 5.8.4
    cpe:2.3:a:wolfssl:wolfssl:5.8.4


Contact Us

Shodan ® - All rights reserved