CVE-2026-23519: CWE-208: Observable Timing Discrepancy in RustCrypto utils
CVE-2026-23519 is a high-severity vulnerability in RustCrypto utils prior to version 0. 4. 4, where the conditional move CPU intrinsic (cmovnz) does not execute in constant time on the thumbv6m-none-eabi platform (Cortex M0, M0+, M1). This timing discrepancy can lead to observable side-channel leaks, potentially exposing sensitive information. The flaw arises because the compiler emits non-constant time assembly code, violating the constant-time guarantee critical for cryptographic operations. No known exploits are currently in the wild, but the vulnerability affects embedded systems using these RustCrypto utils on vulnerable platforms. The issue is fixed in version 0. 4. 4. European organizations using embedded devices with Cortex M0/M0+/M1 processors and RustCrypto utils versions before 0.
AI Analysis
Technical Summary
CVE-2026-23519 identifies a timing side-channel vulnerability in the RustCrypto utils library, specifically in the implementation of conditional move CPU intrinsics (cmovnz) on the thumbv6m-none-eabi target architecture, which includes Cortex M0, M0+, and M1 microcontrollers. RustCrypto's CMOV intrinsics are designed to execute in constant time to prevent timing attacks that could leak sensitive cryptographic information. However, prior to version 0.4.4, the compiler targeting these ARM Cortex M0 series processors emits assembly code for the portable cmovnz implementation that is not constant-time, introducing observable timing discrepancies. This discrepancy can be exploited by attackers to infer secret data through side-channel analysis, violating confidentiality. The vulnerability is classified under CWE-208 (Observable Timing Discrepancy). The CVSS 4.0 vector indicates a network attack vector with high attack complexity, no privileges or user interaction required, but with high impact on confidentiality. The vulnerability is fixed in RustCrypto utils version 0.4.4 by ensuring the compiler emits constant-time assembly for the affected platforms. No public exploits have been reported yet, but the vulnerability poses a significant risk to embedded systems relying on these cryptographic primitives for secure operations. The affected platforms are primarily embedded devices using ARM Cortex M0 series processors, common in IoT, industrial control, and automotive applications.
Potential Impact
For European organizations, the impact of CVE-2026-23519 is primarily on embedded systems and IoT devices that utilize RustCrypto utils versions prior to 0.4.4 on Cortex M0, M0+, or M1 processors. These devices may include industrial control systems, automotive components, smart meters, medical devices, and other critical infrastructure equipment. The timing side-channel vulnerability could allow attackers to extract cryptographic keys or sensitive data, undermining device security and potentially enabling further attacks such as unauthorized access, data manipulation, or disruption of services. Given the widespread adoption of ARM Cortex M0 series in embedded markets, organizations in sectors like manufacturing, energy, healthcare, and transportation in Europe could face confidentiality breaches or operational risks. Although exploitation complexity is high and no known exploits exist yet, the vulnerability's presence in foundational cryptographic operations elevates the risk profile. Failure to patch could lead to long-term exposure, especially in devices with long operational lifespans and limited update capabilities.
Mitigation Recommendations
European organizations should immediately audit their embedded device inventories to identify those running RustCrypto utils versions earlier than 0.4.4 on Cortex M0, M0+, or M1 processors. They should prioritize upgrading RustCrypto utils to version 0.4.4 or later, which contains the fix ensuring constant-time execution of cmovnz instructions. For devices where updates are not feasible, organizations should consider compensating controls such as isolating vulnerable devices on segmented networks, implementing strict access controls, and monitoring for anomalous timing-based side-channel attack attempts. Developers should review cryptographic implementations for constant-time guarantees, especially when targeting embedded platforms with constrained compilers. Additionally, organizations should engage with device vendors to confirm patch availability and deployment plans. Incorporating side-channel resistance testing into the development and procurement lifecycle can help prevent similar vulnerabilities. Finally, maintaining robust incident response plans for embedded device compromise scenarios is recommended.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-23519: CWE-208: Observable Timing Discrepancy in RustCrypto utils
Description
CVE-2026-23519 is a high-severity vulnerability in RustCrypto utils prior to version 0. 4. 4, where the conditional move CPU intrinsic (cmovnz) does not execute in constant time on the thumbv6m-none-eabi platform (Cortex M0, M0+, M1). This timing discrepancy can lead to observable side-channel leaks, potentially exposing sensitive information. The flaw arises because the compiler emits non-constant time assembly code, violating the constant-time guarantee critical for cryptographic operations. No known exploits are currently in the wild, but the vulnerability affects embedded systems using these RustCrypto utils on vulnerable platforms. The issue is fixed in version 0. 4. 4. European organizations using embedded devices with Cortex M0/M0+/M1 processors and RustCrypto utils versions before 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-23519 identifies a timing side-channel vulnerability in the RustCrypto utils library, specifically in the implementation of conditional move CPU intrinsics (cmovnz) on the thumbv6m-none-eabi target architecture, which includes Cortex M0, M0+, and M1 microcontrollers. RustCrypto's CMOV intrinsics are designed to execute in constant time to prevent timing attacks that could leak sensitive cryptographic information. However, prior to version 0.4.4, the compiler targeting these ARM Cortex M0 series processors emits assembly code for the portable cmovnz implementation that is not constant-time, introducing observable timing discrepancies. This discrepancy can be exploited by attackers to infer secret data through side-channel analysis, violating confidentiality. The vulnerability is classified under CWE-208 (Observable Timing Discrepancy). The CVSS 4.0 vector indicates a network attack vector with high attack complexity, no privileges or user interaction required, but with high impact on confidentiality. The vulnerability is fixed in RustCrypto utils version 0.4.4 by ensuring the compiler emits constant-time assembly for the affected platforms. No public exploits have been reported yet, but the vulnerability poses a significant risk to embedded systems relying on these cryptographic primitives for secure operations. The affected platforms are primarily embedded devices using ARM Cortex M0 series processors, common in IoT, industrial control, and automotive applications.
Potential Impact
For European organizations, the impact of CVE-2026-23519 is primarily on embedded systems and IoT devices that utilize RustCrypto utils versions prior to 0.4.4 on Cortex M0, M0+, or M1 processors. These devices may include industrial control systems, automotive components, smart meters, medical devices, and other critical infrastructure equipment. The timing side-channel vulnerability could allow attackers to extract cryptographic keys or sensitive data, undermining device security and potentially enabling further attacks such as unauthorized access, data manipulation, or disruption of services. Given the widespread adoption of ARM Cortex M0 series in embedded markets, organizations in sectors like manufacturing, energy, healthcare, and transportation in Europe could face confidentiality breaches or operational risks. Although exploitation complexity is high and no known exploits exist yet, the vulnerability's presence in foundational cryptographic operations elevates the risk profile. Failure to patch could lead to long-term exposure, especially in devices with long operational lifespans and limited update capabilities.
Mitigation Recommendations
European organizations should immediately audit their embedded device inventories to identify those running RustCrypto utils versions earlier than 0.4.4 on Cortex M0, M0+, or M1 processors. They should prioritize upgrading RustCrypto utils to version 0.4.4 or later, which contains the fix ensuring constant-time execution of cmovnz instructions. For devices where updates are not feasible, organizations should consider compensating controls such as isolating vulnerable devices on segmented networks, implementing strict access controls, and monitoring for anomalous timing-based side-channel attack attempts. Developers should review cryptographic implementations for constant-time guarantees, especially when targeting embedded platforms with constrained compilers. Additionally, organizations should engage with device vendors to confirm patch availability and deployment plans. Incorporating side-channel resistance testing into the development and procurement lifecycle can help prevent similar vulnerabilities. Finally, maintaining robust incident response plans for embedded device compromise scenarios is recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T18:22:43.980Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6969476c1ab3796b1034af9d
Added to database: 1/15/2026, 8:00:44 PM
Last enriched: 1/22/2026, 9:40:35 PM
Last updated: 2/7/2026, 10:44:03 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.