Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-42368
HistoryAug 13, 2024 - 7:31 p.m.

CVE-2024-42368 open-telemetry has an Observable Timing Discrepancy

2024-08-1319:31:16
CWE-208
GitHub_M
www.cve.org
opentelemetry
observable timing
discrepancy
authentication
timing attack
telemetry
vulnerability
constant-time comparison

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

EPSS

0

Percentile

16.3%

OpenTelemetry, also known as OTel, is a vendor-neutral open source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, and logs. The bearertokenauth extension’s server authenticator performs a simple, non-constant time string comparison of the received & configured bearer tokens. This impacts anyone using the bearertokenauth server authenticator. Malicious clients with network access to the collector may perform a timing attack against a collector with this authenticator to guess the configured token, by iteratively sending tokens and comparing the response time. This would allow an attacker to introduce fabricated or bad data into the collector’s telemetry pipeline. The observable timing vulnerability was fixed by using constant-time comparison in 0.107.0

CNA Affected

[
  {
    "vendor": "open-telemetry",
    "product": "opentelemetry-collector-contrib",
    "versions": [
      {
        "version": ">= 0.80.0, < 0.107.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

EPSS

0

Percentile

16.3%