CVE-2026-3503
MEDIUM
4,3
Source: [email protected]
Attack Vector: physical
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.
This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
DraftCommon Consequences
Security Scopes Affected:
Access Control
Other
Potential Impacts:
Bypass Protection Mechanism
Other
Applicable Platforms
All platforms may be affected
https://github.com/wolfSSL/wolfssl/pull/9734