The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23519

CVE-2026-23519: RustCrypto CMOV Privilege Escalation Flaw

CVE-2026-23519 is a privilege escalation vulnerability in RustCrypto CMOV affecting thumbv6m-none-eabi targets. Non-constant time execution exposes systems to timing attacks. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: January 23, 2026

CVE-2026-23519 Overview

CVE-2026-23519 is a timing attack vulnerability discovered in the RustCrypto CMOV library, which provides conditional move CPU intrinsics designed to execute in constant-time across major platforms. The vulnerability affects versions prior to 0.4.4 when compiled for the thumbv6m-none-eabi target architecture (Cortex M0, M0+, and M1 processors). When using the cmovnz portable version on these platforms, the compiler emits non-constant time assembly code, potentially enabling side-channel attacks that could compromise cryptographic operations.

Critical Impact

Cryptographic implementations relying on RustCrypto CMOV for constant-time operations on ARM Cortex M0/M0+/M1 embedded devices may be vulnerable to timing-based side-channel attacks, potentially exposing sensitive cryptographic keys or data.

Affected Products

  • RustCrypto CMOV versions prior to 0.4.4
  • Applications compiled for thumbv6m-none-eabi target (ARM Cortex M0, M0+, M1)
  • Embedded systems using the portable cmovnz implementation

Discovery Timeline

  • 2026-01-15 - CVE-2026-23519 published to NVD
  • 2026-01-16 - Last updated in NVD database

Technical Details for CVE-2026-23519

Vulnerability Analysis

This vulnerability is classified as CWE-208 (Observable Timing Discrepancy), a side-channel attack vector that exploits timing variations in cryptographic operations. The RustCrypto CMOV library was specifically designed to provide constant-time conditional move operations—a critical requirement for secure cryptographic implementations that must resist timing analysis.

The core issue lies in how the compiler handles the portable cmovnz (conditional move if not zero) implementation when targeting ARM Cortex M0, M0+, and M1 processors (thumbv6m-none-eabi). Instead of generating true constant-time assembly instructions, the compiler optimizes the code into branching instructions that execute in variable time depending on the input values.

Root Cause

The root cause stems from architectural limitations of the ARMv6-M instruction set used in Cortex M0/M0+/M1 processors. Unlike more advanced ARM architectures that support true conditional execution instructions (IT blocks with full support), the Thumb-1 instruction set in ARMv6-M has restricted conditional execution capabilities. When the RustCrypto CMOV portable implementation is compiled for this target, the compiler cannot generate equivalent constant-time code and instead falls back to branch-based conditional logic.

This creates observable timing differences—branches taken vs. not taken—that an attacker with precise timing measurements can exploit to infer information about secret values being processed.

Attack Vector

The attack vector for this vulnerability is network-accessible, requiring high attack complexity. An attacker would need to:

  1. Identify a target system running cryptographic code compiled with the vulnerable CMOV library on Cortex M0/M0+/M1 hardware
  2. Perform timing measurements by sending carefully crafted inputs and measuring response times with high precision
  3. Collect sufficient timing samples to statistically correlate timing variations with secret key bits
  4. Reconstruct sensitive data through differential timing analysis

In embedded IoT environments where Cortex M0/M0+/M1 processors are commonly deployed, attackers may exploit this via network protocols that expose timing information (TLS handshakes, authentication challenges, etc.).

The vulnerability mechanism involves the compiler generating branching code paths instead of constant-time conditional moves. For technical details on the specific fix implemented, see the GitHub Security Advisory and the associated commit change.

Detection Methods for CVE-2026-23519

Indicators of Compromise

  • Applications using RustCrypto CMOV library versions below 0.4.4
  • Build targets configured for thumbv6m-none-eabi architecture
  • Cargo.toml dependencies specifying vulnerable CMOV versions
  • Timing variations observable in cryptographic operation response times

Detection Strategies

  • Audit Cargo.lock files for RustCrypto CMOV dependencies with versions prior to 0.4.4
  • Review build configurations for thumbv6m-none-eabi target specifications
  • Analyze compiled assembly output for branching patterns in conditional move operations
  • Deploy software composition analysis (SCA) tools to identify vulnerable library versions in firmware images

Monitoring Recommendations

  • Implement firmware inventory management to track CMOV library versions across embedded device fleets
  • Monitor for unusual timing patterns in cryptographic operations that may indicate exploitation attempts
  • Establish baseline timing profiles for cryptographic functions to detect anomalous variations
  • Configure alerts for dependency updates in RustCrypto ecosystem libraries

How to Mitigate CVE-2026-23519

Immediate Actions Required

  • Upgrade RustCrypto CMOV library to version 0.4.4 or later immediately
  • Rebuild all applications targeting thumbv6m-none-eabi with the patched library version
  • Deploy updated firmware to affected Cortex M0/M0+/M1 devices
  • Rotate any cryptographic keys that may have been processed by vulnerable implementations

Patch Information

The vulnerability is fixed in RustCrypto CMOV version 0.4.4. The patch ensures proper constant-time execution on ARMv6-M targets by implementing architecture-specific code paths that avoid compiler-generated branches. The fix can be reviewed in the GitHub commit.

To update the dependency, modify your Cargo.toml to require the fixed version:

Workarounds

  • For systems unable to immediately upgrade, consider avoiding cryptographic operations on affected embedded platforms until patching is complete
  • Implement additional timing noise or blinding countermeasures at the application layer as a temporary defense
  • Restrict network access to vulnerable embedded devices to limit remote timing attack feasibility
  • Use alternative cryptographic implementations with verified constant-time behavior on ARMv6-M if available
toml
# Update Cargo.toml dependency
[dependencies]
cmov = ">=0.4.4"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechRustcrypto

  • SeverityHIGH

  • CVSS Score8.9

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-208
  • Technical References
  • GitHub Commit Change

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-24850: ML-DSA Signature Verification Vulnerability

  • CVE-2026-22700: RustCrypto Elliptic Curves DoS Vulnerability

  • CVE-2026-22699: RustCrypto Elliptic Curves DoS Vulnerability

  • CVE-2026-22698: RustCrypto Elliptic Curves Disclosure Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English