mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 |
Wed, 13 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-203 | |
CPEs | cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mudler
Mudler localai |
|
CPEs | cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mudler
Mudler localai |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access. | |
Title | Timing Attack in mudler/localai | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-10-29T12:48:29.287Z
Updated: 2024-11-14T13:28:44.849Z
Reserved: 2024-07-23T03:56:04.540Z
Link: CVE-2024-7010
Vulnrichment
Updated: 2024-10-29T13:30:26.296Z
NVD
Status : Modified
Published: 2024-10-29T13:15:08.683
Modified: 2024-11-14T14:15:19.160
Link: CVE-2024-7010
Redhat
No data.