mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-48031 mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-208

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00089}

epss

{'score': 0.00111}


Thu, 14 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Wed, 13 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-203
CPEs cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 29 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mudler
Mudler localai
CPEs cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*
Vendors & Products Mudler
Mudler localai
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Oct 2024 13:00:00 +0000

Type Values Removed Values Added
Description mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
Title Timing Attack in mudler/localai
Weaknesses CWE-200
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-10-15T12:50:35.354Z

Reserved: 2024-07-23T03:56:04.540Z

Link: CVE-2024-7010

cve-icon Vulnrichment

Updated: 2024-10-29T13:30:26.296Z

cve-icon NVD

Status : Modified

Published: 2024-10-29T13:15:08.683

Modified: 2025-10-15T13:15:50.737

Link: CVE-2024-7010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.