Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through timing side-channel attacks.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/9148 |
|
History
Thu, 11 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through timing side-channel attacks. | |
| Title | Potential non-constant time compiled code with Clang LLVM | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published: 2025-12-11T17:09:59.098Z
Updated: 2025-12-11T19:35:56.056Z
Reserved: 2025-12-02T17:27:26.760Z
Link: CVE-2025-13912
Updated: 2025-12-11T19:19:10.485Z
Status : Received
Published: 2025-12-11T18:16:19.067
Modified: 2025-12-11T18:16:19.067
Link: CVE-2025-13912
No data.