Post-Quantum Implementation Vulnerability in wolfSSL for ARM Cortex-M Microcontrollers
CVE-2026-3503

4.3MEDIUM

Key Information:

Vendor
CVE Published:
19 March 2026

What is CVE-2026-3503?

A significant vulnerability exists in the wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) utilized in wolfSSL on ARM Cortex-M microcontrollers. This flaw enables a physical attacker to exploit transient faults, potentially leading to the compromise of cryptographic keys or the integrity of cryptographic outcomes. The attack involves inducing faults that can corrupt or improperly redirect critical seed or pointer values during the Keccak-based expansion process, thereby jeopardizing the reliability of cryptographic operations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wolfSSL (wolfCrypt) ARM 5.8.2

References

CVSS V4

Score:
4.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Physical
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hariprasad Kelassery Valsaraj of Temasek Laboratories
.