Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Go

Published: 2022-12-27T21:13:11.967Z

Updated: 2023-06-12T19:03:29.255Z

Reserved: 2022-07-29T16:09:30.296Z


Link: CVE-2015-10004

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-27T22:15:10.947

Modified: 2023-01-06T15:39:43.393


Link: CVE-2015-10004

JSON object: View

cve-icon Redhat Information

No data.

CWE