CVE-2026-3503 in wolfSSLinfo

Summary

Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.

Responsible

wolfSSL

Reservation

03/03/2026

Disclosure

03/19/2026

Entries

VulDB provides additional information and datapoints for this CVE:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!