Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3503: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in wolfSSL Inc. wolfSSL (wolfCrypt)

0
Medium
VulnerabilityCVE-2026-3503cvecve-2026-3503cwe-335
Published: Thu Mar 19 2026 (03/19/2026, 18:12:26 UTC)
Source: CVE Database V5
Vendor/Project: wolfSSL Inc.
Product: wolfSSL (wolfCrypt)

Description

CVE-2026-3503 is a medium-severity vulnerability in wolfSSL's wolfCrypt library version 5. 8. 2 affecting ARM Cortex-M microcontrollers. It involves incorrect usage of seeds in the pseudo-random number generator (PRNG) within post-quantum cryptographic implementations (ML-KEM and ML-DSA). A physical attacker can induce transient faults to corrupt or redirect seed or pointer values during the Keccak-based expansion process, potentially compromising key material or cryptographic outcomes. Exploitation requires physical access and high attack complexity, with no user interaction or authentication needed. This vulnerability impacts confidentiality and integrity of cryptographic operations but does not affect availability. No known exploits are currently reported in the wild. Organizations using wolfSSL on ARM Cortex-M devices in security-critical environments should prioritize mitigation. Patch availability is not indicated, so alternative mitigations are necessary.

AI-Powered Analysis

AILast updated: 03/19/2026, 18:53:40 UTC

Technical Analysis

CVE-2026-3503 identifies a protection mechanism failure in the wolfCrypt cryptographic library component of wolfSSL, specifically in its post-quantum cryptographic implementations ML-KEM (Key Encapsulation Mechanism) and ML-DSA (Digital Signature Algorithm). The vulnerability arises from incorrect handling of seeds in the pseudo-random number generator (PRNG) on ARM Cortex-M microcontrollers. The PRNG relies on Keccak-based expansion, and transient faults induced physically by an attacker can corrupt or redirect seed or pointer values during this process. Such corruption undermines the randomness quality and can lead to leakage or compromise of key material and cryptographic outcomes. This fault injection attack requires physical proximity and sophisticated fault induction techniques, making exploitation complex. The vulnerability affects wolfSSL version 5.8.2, as identified by the commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6. The issue is classified under CWE-335, which relates to incorrect usage of seeds in PRNGs, a critical aspect in cryptographic security. The CVSS v4.0 base score is 4.3, reflecting medium severity due to the attack vector being physical with high complexity and partial impact on confidentiality and integrity. No patches have been explicitly linked, and no known exploits are reported in the wild at this time.

Potential Impact

The primary impact of this vulnerability is the potential compromise of cryptographic key material and the integrity of cryptographic operations in devices using wolfSSL's wolfCrypt on ARM Cortex-M microcontrollers. This can lead to unauthorized decryption, signature forgery, or other cryptographic failures, undermining the security guarantees of systems relying on these post-quantum algorithms. Since ARM Cortex-M microcontrollers are widely used in embedded systems, IoT devices, industrial control systems, and security-sensitive applications, the vulnerability could affect a broad range of devices globally. The requirement for physical access and high attack complexity limits the scope of exploitation but does not eliminate risk in high-value targets or environments where attackers can gain proximity. The confidentiality and integrity of sensitive data and communications could be compromised, potentially leading to data breaches, unauthorized control, or disruption of secure communications. Availability is not impacted. Organizations deploying wolfSSL in critical infrastructure, medical devices, automotive systems, or government applications may face significant risks if unmitigated.

Mitigation Recommendations

Given the absence of a publicly available patch, organizations should implement multiple layers of mitigation. First, restrict physical access to devices running vulnerable wolfSSL versions on ARM Cortex-M microcontrollers to prevent fault injection attacks. Employ hardware-based tamper detection and response mechanisms to detect and mitigate transient fault attempts. Use side-channel and fault attack resistant hardware designs where possible. Monitor device behavior for anomalies indicative of fault injection. Where feasible, upgrade to newer wolfSSL versions once patches addressing this vulnerability are released. In the interim, consider disabling or replacing the affected post-quantum cryptographic algorithms (ML-KEM and ML-DSA) with alternatives not vulnerable to this issue. Conduct thorough security assessments of embedded devices to identify wolfSSL usage and assess exposure. Implement cryptographic key management best practices, including frequent key rotation and secure storage, to limit the impact of potential key compromise. Collaborate with wolfSSL support for guidance and updates. Finally, maintain physical security policies and employee training to reduce insider threats and unauthorized device access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wolfSSL
Date Reserved
2026-03-03T22:56:47.976Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc42d8e32a4fbe5fe8af3f

Added to database: 3/19/2026, 6:39:20 PM

Last enriched: 3/19/2026, 6:53:40 PM

Last updated: 3/19/2026, 7:39:50 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses