Intel

AIKIDO-2026-10431

wolfSSL.wolfssl is vulnerable to Observable Timing Discrepancy

Observable Timing DiscrepancyCVE-2026-3580

21

Low Risk

This Affects:

C++wolfSSL.wolfssl
0.0.1 - 5.8.4
Fixed in 5.9.0

TL;DR

On RISC-V RV32I with aggressive optimization, constant-time masking in sp_256_get_entry_256_9 can compile to conditional branches, breaking side-channel resistance for ECC scalar multiplication. A local attacker with timing visibility may recover key bits. The fix avoids the branchy lowering for this path.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

wolfSSL.wolfssl is vulnerable to Observable Timing Discrepancy in versions 0.0.1 - 5.8.4.

How to fix this

Upgrade the wolfSSL.wolfssl library to the patch version.