CVE-2024-0436

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Configurations

No configuration.

History

26 Feb 2024, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2024-02-28 20:54


NVD link : CVE-2024-0436

Mitre link : CVE-2024-0436

CVE.ORG link : CVE-2024-0436


JSON object : View

Products Affected

No product.

CWE
CWE-764

Multiple Locks of a Critical Resource