Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-02-25T16:25:11.963Z

Updated: 2024-08-01T18:04:49.780Z

Reserved: 2024-01-11T18:58:30.511Z

Link: CVE-2024-0436

cve-icon Vulnrichment

Updated: 2024-08-01T18:04:49.780Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-26T16:27:50.283

Modified: 2024-02-26T16:32:25.577

Link: CVE-2024-0436

cve-icon Redhat

No data.