EUVD-2026-13149

| CVE-2026-3503 MEDIUM
2026-03-19 wolfSSL
4.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N/U:Amber
Attack Vector
Physical
Attack Complexity
High
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 19, 2026 - 19:00 vuln.today
EUVD ID Assigned
Mar 19, 2026 - 19:00 euvd
EUVD-2026-13149
CVE Published
Mar 19, 2026 - 18:12 nvd
MEDIUM 4.3

Description

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.

Analysis

CVE-2026-3503 is a security vulnerability (CVSS 4.3) that allows a physical attacker. Remediation should follow standard vulnerability management procedures.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 30 days: Identify affected systems and apply vendor patches as part of regular patch cycle. Monitor vendor channels for patch availability.

Sign in for detailed remediation steps.

Priority Score

22
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +22
POC: 0

Vendor Status

Debian

wolfssl
Release Status Fixed Version Urgency
bullseye vulnerable 4.6.0+p1-0+deb11u2 -
bookworm vulnerable 5.5.4-2+deb12u2 -
trixie vulnerable 5.7.2-0.1+deb13u1 -
forky, sid vulnerable 5.8.4-1 -
(unstable) fixed (unfixed) -

Share

EUVD-2026-13149 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy