2026-03-19 18:12CVE-2026-3503wolfSSL
PUBLISHED5.2CWE-335

Fault injection attack with ML-DSA and ML-KEM on ARM

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.

This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.

Problem type

Affected products

wolfSSL Inc.

wolfSSL (wolfCrypt)

< 5.9.0 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-3503
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-3503",
    "assignerOrgId": "50d2cd11-d01a-48ed-9441-5bfce9d63b27",
    "assignerShortName": "wolfSSL",
    "dateUpdated": "2026-03-19T19:24:36.198Z",
    "dateReserved": "2026-03-03T22:56:47.976Z",
    "datePublished": "2026-03-19T18:12:26.909Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "50d2cd11-d01a-48ed-9441-5bfce9d63b27",
        "shortName": "wolfSSL",
        "dateUpdated": "2026-03-19T18:12:26.909Z"
      },
      "title": "Fault injection attack with ML-DSA and ML-KEM on ARM",
      "descriptions": [
        {
          "lang": "en",
          "value": "Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.\n\n\n\n\nThis issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.<br></p><p></p><p>This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.</p><br><p></p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "wolfSSL Inc.",
          "product": "wolfSSL (wolfCrypt)",
          "collectionURL": "https://github.com/wolfSSL/wolfssl",
          "packageName": "wolfssl",
          "modules": [
            "wolfCrypt",
            "ML-KEM",
            "ML-DSA"
          ],
          "platforms": [
            "ARM"
          ],
          "repo": "https://github.com/wolfSSL/wolfssl",
          "defaultStatus": "affected",
          "versions": [
            {
              "version": "5.8.2",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "5.9.0"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)",
              "cweId": "CWE-335",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://github.com/wolfSSL/wolfssl/pull/9734",
          "tags": [
            "x_refsource_CONFIRM"
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-624",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-624 Hardware Fault Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Hariprasad Kelassery Valsaraj of Temasek Laboratories",
          "type": "finder"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-03-19T19:24:36.198Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}