Timing Side-Channel Vulnerability in wolfSSL Software on RISC-V
CVE-2026-3579

2.1LOW

Key Information:

Vendor

Wolfssl

Status
Vendor
CVE Published:
19 March 2026

What is CVE-2026-3579?

The wolfSSL 5.8.4 library running on RISC-V RV32I architectures contains a timing side-channel vulnerability caused by the absence of a constant-time implementation for 64-bit multiplication. This issue manifests through compiler-inserted subroutines that execute in variable time, ultimately affecting several mathematical functions, such as sp_256_mul_9 and sp_256_sqr_9. As a result, this vulnerability can allow attackers to exploit timing variations to deduce sensitive cryptographic information via side-channel attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wolfSSL RISC-V RV32I (No M-Extension) 0 < 5.9.0

References

CVSS V4

Score:
2.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Wind Wong
.