Vulnerability Details CVE-2024-25714
In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures. (The fix uses gnutls_memcmp, which has constant-time execution.)
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.1%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2024-25714
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.10
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.11
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.12
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.13
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.2
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.3
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.4
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.5
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.6
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.7
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.8
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.9
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.99
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.999
-
cpe:2.3:a:rhonabwy_project:rhonabwy:0.9.9999
-
cpe:2.3:a:rhonabwy_project:rhonabwy:1.0.0
-
cpe:2.3:a:rhonabwy_project:rhonabwy:1.1.0
-
cpe:2.3:a:rhonabwy_project:rhonabwy:1.1.1
-
cpe:2.3:a:rhonabwy_project:rhonabwy:1.1.2
-
cpe:2.3:a:rhonabwy_project:rhonabwy:1.1.3
-
cpe:2.3:o:debian:debian_linux:11.0
-
cpe:2.3:o:debian:debian_linux:12.0