CVE-2025-12888Observable Discrepancy in Wolfssl

Severity
1.0LOWNVD
EPSS
0.0%
top 97.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateNov 22

Description

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS vector

CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:N

Affected Packages9 packages

debiandebian/wolfssl< wolfssl 5.8.4-1 (forky)
CVEListV5wolfssl/wolfssl< 5.8.4
Debianwolfssl/wolfssl< 5.8.4-1
NVDwolfssl/wolfssl5.8.2

🔴Vulnerability Details

2
GHSA
GHSA-xmgq-3783-qgm4: Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architect2025-11-22
OSV
CVE-2025-12888: Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architect2025-11-21

📋Vendor Advisories

3
Microsoft
Constant Time Issue with Xtensa-based ESP32 and X225192025-11-11
Debian
CVE-2025-12888: wolfssl - Vulnerability in X25519 constant-time cryptographic implementations due to timin...2025
Microsoft
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.2020-05-12
CVE-2025-12888 — Observable Discrepancy in Wolfssl | cvebase