We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7396

Curve25519 Blinding



Description

In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the side-channel attack on extracting a private key would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation.

Reserved 2025-07-09 | Published 2025-07-18 | Updated 2025-07-18 | Assigner wolfSSL


MEDIUM: 5.6CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Product status

Default status
unknown

5.8.0; 0
affected

Credits

Arnaud Varillon finder

Laurent Sauvage finder

Allan Delautre finder

References

github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md

cve.org (CVE-2025-7396)

nvd.nist.gov (CVE-2025-7396)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7396

Support options

Helpdesk Chat, Email, Knowledgebase