Early Access — Mondoo Vulnerability Intelligence is currently in preview.
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
Exploitability
AV:PAC:HAT:PPR:LUI:NVulnerable System
VC:LVI:NVA:NSubsequent System
SC:LSI:LSA:N1/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:NOther