Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2792 articles · 110450 vulns · 36/41 feeds (7d)
← Back to list
EST
PRE-CVEEXPLOITEDPATCHED
wolfssl · wolfssl ml-dsa

wolfSSL ML-DSA Heap Reuse Exposes Private Signing Material

60% confidence

Description

wolfSSL's ML-DSA-44 signing function (dilithium_sign_with_seed_mu() in dilithium.c) frees a ~50KB heap block containing private signing material (s1, s2, t0 in NTT form) without clearing it. For a same-process attacker able to allocate and read a same-size heap block, the key material is recoverable. On glibc tcache, the PoC recovers s1 from the freed block and forges signatures on arbitrary messages -- verified against the compiled libwolfssl binary on three Linux distributions and macOS. wolfSSL already fixed this exact pattern -- missing ForceZero before free of private key material -- in dilithium keygen (643427040), ed25519 signing (5f7bc0f3a), and ed448 signing (109e765b5). The ML-DSA signing path was missed. FIPS 204 Section 3.6.3 requires implementations 'shall ensure that any potentially sensitive intermediate data is destroyed as soon as it is no longer needed.'

Affected Products

VendorProductVersions
wolfsslwolfssl ml-dsav5.7.2 - v5.9.0-stable

Related News (1 articles)

Tier C
oss-security5h ago
wolfSSL ML-DSA: same-process heap reuse exposes private signing material, enabling signature forgery
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
PRs #10100#10113
CWECWE-244, CWE-226
PublishedApr 14, 2026
Last enriched35m agov2
Tags
signature forgeryheap reuseprivate key exposure
Trending Score46
Source articles1
Independent1
Info Completeness9/14
Missing: cve_id, cvss, epss, kev, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 72
CRITICALCVE-2026-5187EXP
Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL
Trending: 60
NONECVE-2026-5393EXP
OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS
Trending: 60
NONECVE-2026-5446EXP
wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse
Trending: 50
NONECVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 29

Pin to Dashboard

Verification

State: archived
Confidence: 60%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Actively Exploited
Apr 14, 2026
Exploit Available
Apr 14, 2026
Patch Available
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: description, patchAvailable, activelyExploited, iocs
Apr 14, 2026

Version History

v2
Last enriched 35m ago
v2Tier C35m ago

Updated description with detailed technical information, added patch information, marked the vulnerability as actively exploited, and included a URL for the proof of concept.

descriptionpatchAvailableactivelyExploitediocs
via oss-security
v14h ago

Initial creation