Home

Description

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

PUBLISHED Reserved 2025-11-07 | Published 2025-11-21 | Updated 2025-11-21 | Assigner wolfSSL




LOW: 1.0CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-203 Observable Discrepancy

Product status

Default status
unaffected

5.8.2
affected

Credits

Adrian Cinal finder

References

https//github.com/wolfSSL/wolfssl/pull/9275

cve.org (CVE-2025-12888)

nvd.nist.gov (CVE-2025-12888)

Download JSON