{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3503","assignerOrgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","state":"PUBLISHED","assignerShortName":"wolfSSL","dateReserved":"2026-03-03T22:56:47.976Z","datePublished":"2026-03-19T18:12:26.909Z","dateUpdated":"2026-03-19T19:24:36.198Z"},"containers":{"cna":{"providerMetadata":{"orgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","shortName":"wolfSSL","dateUpdated":"2026-03-19T18:12:26.909Z"},"title":"Fault injection attack with ML-DSA and ML-KEM on ARM","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-335","description":"CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-624","descriptions":[{"lang":"en","value":"CAPEC-624 Hardware Fault Injection"}]}],"affected":[{"vendor":"wolfSSL Inc.","product":"wolfSSL (wolfCrypt)","platforms":["ARM"],"collectionURL":"https://github.com/wolfSSL/wolfssl","packageName":"wolfssl","repo":"https://github.com/wolfSSL/wolfssl","modules":["wolfCrypt","ML-KEM","ML-DSA"],"versions":[{"status":"affected","version":"5.8.2","lessThan":"5.9.0","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.\n\n\n\n\nThis issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion.<br></p><p></p><p>This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6.</p><br><p></p>"}]}],"references":[{"url":"https://github.com/wolfSSL/wolfssl/pull/9734","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"PHYSICAL","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"AMBER","version":"4.0","baseSeverity":"MEDIUM","baseScore":4.3,"vectorString":"CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N/U:Amber"}}],"credits":[{"lang":"en","value":"Hariprasad Kelassery Valsaraj of Temasek Laboratories","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-19T19:24:29.505763Z","id":"CVE-2026-3503","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-19T19:24:36.198Z"}}]}}