wolfSSL.wolfssl is vulnerable to Observable Timing Discrepancy
21
Low Risk
On RISC-V RV32I with aggressive optimization, constant-time masking in sp_256_get_entry_256_9 can compile to conditional branches, breaking side-channel resistance for ECC scalar multiplication. A local attacker with timing visibility may recover key bits. The fix avoids the branchy lowering for this path.
You are affected if you are using a version that falls within the vulnerable range.
wolfSSL.wolfssl is vulnerable to Observable Timing Discrepancy in versions 0.0.1 - 5.8.4.
Upgrade the wolfSSL.wolfssl library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant