Vulnerability in X25519 constant-time cryptographic...
Low severity
Unreviewed
Published
Nov 22, 2025
to the GitHub Advisory Database
•
Updated Nov 22, 2025
Description
Published by the National Vulnerability Database
Nov 21, 2025
Published to the GitHub Advisory Database
Nov 22, 2025
Last updated
Nov 22, 2025
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
References