First published: Wed Sep 25 2024(Updated: )
OpenSlides 4.0.15 verifies passwords by comparing password hashes using a function with content-dependent runtime. This can allow attackers to obtain information about the password hash using a timing attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSlides |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22893 has been assigned a moderate severity level, indicating a significant risk that should be addressed.
To fix CVE-2024-22893, update OpenSlides to the latest version that addresses the timing attack vulnerability.
CVE-2024-22893 affects OpenSlides version 4.0.15, where password verification is susceptible to timing attacks.
CVE-2024-22893 enables attackers to perform timing attacks to potentially discover valid password hashes.
Yes, CVE-2024-22893 is a known issue specifically in OpenSlides 4.0.15, highlighting vulnerabilities in earlier implementations.