The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-3503

CVE-2026-3503: wolfSSL Information Disclosure Vulnerability

CVE-2026-3503 is an information disclosure flaw in wolfSSL's post-quantum implementations on ARM Cortex-M devices. Physical attackers can exploit transient faults to compromise cryptographic keys and outcomes.

Published: March 19, 2026

CVE-2026-3503 Overview

A protection mechanism failure vulnerability exists in wolfCrypt's post-quantum cryptographic implementations (ML-KEM and ML-DSA) within wolfSSL when deployed on ARM Cortex-M microcontrollers. This vulnerability allows a physical attacker with hardware access to compromise key material and cryptographic outcomes by inducing transient faults that corrupt or redirect seed and pointer values during Keccak-based expansion operations.

Critical Impact

Physical attackers can compromise post-quantum cryptographic key material through fault injection attacks, potentially undermining the security guarantees of ML-KEM key encapsulation and ML-DSA digital signatures on embedded systems.

Affected Products

  • wolfSSL (wolfCrypt) commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6
  • wolfSSL deployments on ARM Cortex-M microcontrollers using ML-KEM implementations
  • wolfSSL deployments on ARM Cortex-M microcontrollers using ML-DSA implementations

Discovery Timeline

  • 2026-03-19 - CVE CVE-2026-3503 published to NVD
  • 2026-03-19 - Last updated in NVD database

Technical Details for CVE-2026-3503

Vulnerability Analysis

This vulnerability targets the post-quantum cryptographic implementations in wolfCrypt, specifically affecting the ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) and ML-DSA (Module-Lattice-Based Digital Signature Algorithm) modules. These algorithms are part of the NIST post-quantum cryptography standardization effort, designed to resist attacks from quantum computers.

The flaw resides in the protection mechanisms implemented to safeguard the Keccak-based expansion functions used during key generation and cryptographic operations. ARM Cortex-M microcontrollers, commonly found in IoT devices and embedded systems, are particularly susceptible to physical fault injection attacks such as voltage glitching, electromagnetic fault injection (EMFI), or laser fault injection.

When an attacker induces transient faults during the Keccak permutation or during seed/pointer operations, they can cause the cryptographic implementation to operate on corrupted data or redirect memory accesses to attacker-controlled locations. This can result in the exposure of secret key material or predictable cryptographic outputs that undermine the security of the entire cryptographic scheme.

Root Cause

The root cause is classified as CWE-335 (Incorrect Usage of Seeds in Pseudo-Random Number Generator). The vulnerability stems from insufficient protection against fault injection attacks during the seed expansion phase of the post-quantum algorithms. The Keccak-based expansion function, which derives keying material from initial seeds, lacks adequate countermeasures to detect or prevent corruption of critical seed values and memory pointers when subjected to physical fault injection.

Attack Vector

The attack requires physical access to the target device running wolfSSL on an ARM Cortex-M microcontroller. An attacker must be capable of inducing precise transient faults through techniques such as:

  1. Voltage Glitching: Momentarily disrupting the power supply to cause computational errors
  2. Electromagnetic Fault Injection (EMFI): Using electromagnetic pulses to corrupt specific memory or register values
  3. Laser Fault Injection: Using focused laser beams to flip bits in specific memory locations

During the Keccak-based expansion phase of ML-KEM or ML-DSA operations, the attacker times their fault injection to corrupt seed values or redirect pointers. This can cause the PRNG to produce predictable outputs, leak portions of the secret key through differential fault analysis, or cause the algorithm to use attacker-influenced values in place of legitimate cryptographic material.

The physical access requirement limits the attack surface, but embedded systems in physically accessible locations (IoT devices, smart cards, automotive systems) remain at risk.

Detection Methods for CVE-2026-3503

Indicators of Compromise

  • Unexpected cryptographic operation failures or inconsistent outputs from ML-KEM/ML-DSA functions
  • Physical evidence of tampering on devices running wolfSSL on ARM Cortex-M platforms
  • Anomalous power consumption patterns that may indicate fault injection attempts
  • Cryptographic signature verification failures that cannot be attributed to software bugs

Detection Strategies

  • Implement hardware-based tamper detection mechanisms to identify physical access attempts
  • Monitor for anomalous behavior in cryptographic operations including unexpected timing variations
  • Deploy integrity verification for cryptographic outputs using redundant computation
  • Utilize secure elements or hardware security modules (HSMs) that provide physical tamper resistance

Monitoring Recommendations

  • Enable detailed logging of cryptographic operations to identify patterns indicative of fault injection attacks
  • Implement runtime integrity checks for critical memory regions used during post-quantum cryptographic operations
  • Consider deploying environmental sensors (voltage, temperature, electromagnetic) to detect fault injection attempts
  • Regularly audit physical security controls for devices using wolfSSL in security-critical applications

How to Mitigate CVE-2026-3503

Immediate Actions Required

  • Update wolfSSL to a version containing the fix from the wolfSSL Pull Request #9734
  • Assess physical security controls for all devices running wolfSSL with post-quantum cryptography on ARM Cortex-M platforms
  • Consider temporarily disabling ML-KEM and ML-DSA functionality on devices in physically insecure environments until patching is complete
  • Implement additional application-layer verification for cryptographic operations where feasible

Patch Information

A fix has been submitted to the wolfSSL repository addressing this vulnerability. The patch is available in wolfSSL Pull Request #9734. The affected commit is d86575c766e6e67ef93545fa69c04d6eb49400c6. Organizations should update to a wolfSSL version that includes this fix and rebuild their applications.

Workarounds

  • Restrict physical access to devices running vulnerable wolfSSL implementations through enhanced physical security measures
  • Consider using hardware security modules (HSMs) or secure elements for post-quantum cryptographic operations instead of software implementations
  • Implement redundant cryptographic operations with comparison checks to detect fault-induced errors
  • Enable compiler-level hardening options and fault detection countermeasures where available in the toolchain
bash
# Configuration example
# Update wolfSSL to patched version
git clone https://github.com/wolfSSL/wolfssl.git
cd wolfssl
git pull origin master
# Verify the fix is included by checking for PR #9734 changes
git log --oneline | grep -i "fault\|keccak\|ML-KEM\|ML-DSA"
# Rebuild with hardening options
./autogen.sh
./configure --enable-hardening --enable-pq
make
make install

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechWolfssl

  • SeverityMEDIUM

  • CVSS Score4.3

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-335
  • Technical References
  • GitHub wolfSSL Pull Request
  • Related CVEs
  • CVE-2026-3230: wolfSSL TLS 1.3 Information Disclosure Flaw

  • CVE-2026-3580: wolfSSL Information Disclosure Vulnerability

  • CVE-2026-3579: wolfSSL Information Disclosure Vulnerability

  • CVE-2025-7394: WolfSSL Information Disclosure Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English