We found results for “”
CVE-2025-12888
Good to know:
Date: November 21, 2025
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
Severity Score
Severity Score
Weakness Type (CWE)
Observable Discrepancy
CWE-203Top Fix
Upgrade Version
Upgrade to version https://github.com/wolfSSL/wolfssl.git - v5.8.4-stable
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | PHYSICAL |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


