Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3503: CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) in wolfSSL Inc. wolfSSL (wolfCrypt)

0
Medium
VulnerabilityCVE-2026-3503cvecve-2026-3503cwe-335
Published: Thu Mar 19 2026 (03/19/2026, 18:12:26 UTC)
Source: CVE Database V5
Vendor/Project: wolfSSL Inc.
Product: wolfSSL (wolfCrypt)

Description

CVE-2026-3503 is a medium severity vulnerability in wolfSSL's wolfCrypt library version 5. 8. 2 affecting ARM Cortex-M microcontrollers. The flaw involves incorrect usage of seeds in the pseudo-random number generator (PRNG) within post-quantum cryptographic implementations (ML-KEM and ML-DSA). Physical attackers can induce transient faults to corrupt or redirect seed or pointer values during the Keccak-based expansion process, potentially compromising key material or cryptographic outcomes. Exploitation requires physical access and high attack complexity, with no user interaction needed. This vulnerability impacts confidentiality due to possible key leakage but has limited scope and availability impact. No known exploits are reported in the wild. Organizations using affected wolfSSL versions on ARM Cortex-M devices should prioritize patching or apply hardware-level protections against fault injection attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:28:22 UTC

Technical Analysis

CVE-2026-3503 is a vulnerability identified in wolfSSL's wolfCrypt cryptographic library, specifically in version 5.8.2, targeting ARM Cortex-M microcontrollers. The issue arises from incorrect usage of seeds in the pseudo-random number generator (PRNG) used in post-quantum cryptographic algorithms ML-KEM (Key Encapsulation Mechanism) and ML-DSA (Digital Signature Algorithm). These algorithms rely on Keccak-based expansion for seed generation and cryptographic operations. The vulnerability allows a physical attacker to induce transient faults—such as voltage glitches or electromagnetic interference—that corrupt or redirect seed or pointer values during the Keccak expansion phase. This fault injection can lead to compromised key material or manipulated cryptographic outcomes, undermining the security guarantees of the post-quantum algorithms. The attack requires physical proximity and sophisticated fault injection techniques, making exploitation complex. The vulnerability is classified under CWE-335, indicating incorrect usage of seeds in PRNGs, which can weaken randomness and cryptographic strength. No patches or exploit code are currently available, and no known active exploitation has been reported. The CVSS v4.0 score is 4.3 (medium), reflecting the limited attack vector (physical), high complexity, and partial confidentiality impact. The flaw primarily threatens confidentiality by potentially exposing secret keys or enabling cryptographic failures, but it does not affect availability or integrity broadly. This vulnerability is significant for embedded systems and IoT devices using wolfSSL on ARM Cortex-M platforms, especially where post-quantum cryptography is employed for future-proofing security.

Potential Impact

The primary impact of CVE-2026-3503 is the potential compromise of cryptographic key material and the integrity of cryptographic operations in devices using wolfSSL's post-quantum implementations on ARM Cortex-M microcontrollers. This can lead to unauthorized disclosure of sensitive information protected by these keys, undermining confidentiality. Organizations relying on these cryptographic primitives for secure communications, firmware integrity, or authentication may face risks of data breaches or cryptographic failures. The physical attack requirement limits the scope to environments where attackers can access devices directly, such as industrial control systems, IoT deployments, or embedded systems in critical infrastructure. The medium severity reflects the high attack complexity and limited availability impact, but the confidentiality breach potential is significant for high-value targets. If exploited, attackers could bypass cryptographic protections, leading to further compromise of systems or networks. The lack of known exploits reduces immediate risk, but the vulnerability highlights the need for robust physical security and fault injection countermeasures in embedded cryptographic implementations.

Mitigation Recommendations

To mitigate CVE-2026-3503, organizations should first upgrade wolfSSL to a version where this vulnerability is patched once available. In the absence of a patch, implement hardware-level protections against fault injection attacks, such as voltage and clock glitch detection, electromagnetic shielding, and sensor monitoring to detect abnormal conditions. Employ secure boot and runtime integrity checks to detect tampering attempts. Limit physical access to devices, especially in sensitive environments, to reduce the risk of fault injection. Review and harden the implementation of PRNGs and post-quantum cryptographic algorithms to ensure proper seed handling and validation. Conduct thorough security testing including fault injection analysis during development and deployment. Additionally, consider using hardware security modules (HSMs) or trusted execution environments (TEEs) that provide hardened cryptographic operations resistant to physical attacks. Maintain up-to-date threat intelligence and monitor for any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
wolfSSL
Date Reserved
2026-03-03T22:56:47.976Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc42d8e32a4fbe5fe8af3f

Added to database: 3/19/2026, 6:39:20 PM

Last enriched: 3/26/2026, 7:28:22 PM

Last updated: 5/2/2026, 3:22:47 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses