First published: Fri Sep 24 2021(Updated: )
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor Browser | <=10.5.6 | |
Torproject Tor Browser | =11.0-alpha2 | |
Torproject Tor Browser | =11.0-alpha4 | |
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39246 is a vulnerability in Tor Browser versions 10.5.6 and 11.x through 11.0a4 that allows a correlation attack compromising the privacy of visits to v2 onion addresses.
CVE-2021-39246 affects Tor Browser versions 10.5.6 and 11.x through 11.0a4 by enabling a correlation attack that compromises the privacy of visits to v2 onion addresses.
The severity of CVE-2021-39246 is medium with a CVSS score of 6.1.
CVE-2021-39246 can be exploited by an attacker comparing exact timestamps of locally logged onion-service visits to timestamp data collected by the destination.
No, Apple macOS and Linux Linux kernel are not affected by CVE-2021-39246.