PatchSiren cyber security CVE debrief
CVE-2016-3995 Cryptopp CVE debrief
Crypto++ versions before 5.6.4 are affected by a side-channel weakness in Rijndael encryption and decryption paths. According to NVD, compiler optimization may remove timing-attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock, which can expose confidential information to timing attacks.
- Vendor
- Cryptopp
- Product
- CVE-2016-3995
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Developers and operators using Crypto++ before 5.6.4, especially in applications that rely on Rijndael/AES for protecting secret data and expect constant-time behavior.
Technical summary
NVD identifies CVE-2016-3995 as a confidentiality issue in Crypto++ (cryptopp) before 5.6.4. The vulnerable code paths are Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock. The concern is that timing-attack protection may be optimized out by the compiler, undermining side-channel resistance and potentially allowing attackers to infer sensitive information through timing analysis.
Defensive priority
High. This is a confidentiality-focused cryptographic side-channel issue affecting a widely used primitive and should be remediated promptly wherever affected Crypto++ versions are deployed.
Recommended defensive actions
- Upgrade Crypto++ to version 5.6.4 or later.
- Audit applications and dependencies to confirm whether Crypto++ is used for Rijndael/AES operations.
- Rebuild affected software after upgrading to ensure the fixed library is linked and deployed.
- Review compiler and build settings for cryptographic code paths to make sure intended constant-time protections are preserved.
- Validate remediation against vendor and project guidance referenced in the NVD record and project issue tracker.
Evidence notes
The NVD record states that timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ before 5.6.4 may be optimized out by the compiler, enabling timing attacks. NVD lists affected versions up to and including 5.6.3. Supporting references include the Crypto++ issue tracker and an OSS-security mailing list post dated 2016-04-11, which indicate earlier public discussion and patch context, but the CVE publication date used here is 2017-02-13.
Official resources
-
CVE-2016-3995 CVE record
CVE.org
-
CVE-2016-3995 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
Public vulnerability references in the supplied corpus date to 2016-04-11, while the CVE was published by NVD on 2017-02-13. Use the CVE published date for CVE timing context; the earlier reference date reflects prior disclosure or patch-ad