Логотип exploitDog
bind:"CVE-2025-59432"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-59432"

Количество 7

Количество 7

ubuntu логотип

CVE-2025-59432

3 месяца назад

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

EPSS: Низкий
redhat логотип

CVE-2025-59432

3 месяца назад

No description is available for this CVE.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2025-59432

3 месяца назад

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

EPSS: Низкий
debian логотип

CVE-2025-59432

3 месяца назад

SCRAM (Salted Challenge Response Authentication Mechanism) is part of ...

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025-20059-1

28 дней назад

Security update for ongres-scram

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4054-1

около 1 месяца назад

Security update for ongres-scram

EPSS: Низкий
github логотип

GHSA-3wfh-36rx-9537

3 месяца назад

Timing Attack Vulnerability in SCRAM Authentication

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-59432

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-59432

No description is available for this CVE.

CVSS3: 6.8
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-59432

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

0%
Низкий
3 месяца назад
debian логотип
CVE-2025-59432

SCRAM (Salted Challenge Response Authentication Mechanism) is part of ...

0%
Низкий
3 месяца назад
suse-cvrf логотип
openSUSE-SU-2025-20059-1

Security update for ongres-scram

0%
Низкий
28 дней назад
suse-cvrf логотип
SUSE-SU-2025:4054-1

Security update for ongres-scram

0%
Низкий
около 1 месяца назад
github логотип
GHSA-3wfh-36rx-9537

Timing Attack Vulnerability in SCRAM Authentication

0%
Низкий
3 месяца назад

Уязвимостей на страницу