In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the side-channel attack on extracting a private key would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation.
References
| Link | Resource |
|---|---|
| https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025 | Release Notes |
Configurations
History
03 Dec 2025, 15:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wolfssl
Wolfssl wolfssl |
|
| CPE | cpe:2.3:a:wolfssl:wolfssl:5.8.2:*:*:*:*:*:*:* | |
| References | () https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-582-july-17-2025 - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
Information
Published : 2025-07-18 23:15
Updated : 2025-12-03 15:25
NVD link : CVE-2025-7396
Mitre link : CVE-2025-7396
CVE.ORG link : CVE-2025-7396
JSON object : View
Products Affected
wolfssl
- wolfssl
CWE
CWE-385
Covert Timing Channel
