CVE-2026-3503
Fault injection attack with ML-DSA and ML-KEM on ARM
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.
| CWE | CWE-335 |
| Vendor | wolfssl inc. |
| Product | wolfssl (wolfcrypt) |
| Published | Mar 19, 2026 |
| Last Updated | Mar 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for wolfssl inc. wolfssl (wolfcrypt)
Be the first to know when new unknown vulnerabilities affecting wolfssl inc. wolfssl (wolfcrypt) are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
wolfSSL Inc. / wolfSSL (wolfCrypt)
5.8.2 < 5.9.0
References
Credits
Hariprasad Kelassery Valsaraj of Temasek Laboratories