Home
LOW: 1.0 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:NDefault status
unaffected
5.8.2
affected
Description
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
Problem types
CWE-203 Observable Discrepancy
Product status
5.8.2
Credits
Adrian Cinal
References
https//github.com/wolfSSL/wolfssl/pull/9275