CVE-2025-7396

In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the side-channel attack on extracting a private key would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:5.8.2:*:*:*:*:*:*:*

History

03 Dec 2025, 15:25

Type Values Removed Values Added
First Time Wolfssl
Wolfssl wolfssl
CPE cpe:2.3:a:wolfssl:wolfssl:5.8.2:*:*:*:*:*:*:*
References () https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025 - () https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025 - Release Notes
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.6

Information

Published : 2025-07-18 23:15

Updated : 2025-12-03 15:25


NVD link : CVE-2025-7396

Mitre link : CVE-2025-7396

CVE.ORG link : CVE-2025-7396


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-385

Covert Timing Channel