CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
42.5%
Token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless.
Library now used constant-time comparison.
No.
If you have any questions or comments about this advisory:
Vendor | Product | Version | CPE |
---|---|---|---|
totp-rs_project | totp-rs | * | cpe:2.3:a:totp-rs_project:totp-rs:*:*:*:*:*:rust:*:* |
github.com/advisories/GHSA-8vxv-2g8p-2249
github.com/constantoine/totp-rs/commit/1f1e1a6fe722deb1656f483b1367ea4be978db5b
github.com/constantoine/totp-rs/compare/v1.0...v1.1.0
github.com/constantoine/totp-rs/issues/13
github.com/constantoine/totp-rs/releases/tag/v1.1.0
github.com/constantoine/totp-rs/security/advisories/GHSA-8vxv-2g8p-2249
nvd.nist.gov/vuln/detail/CVE-2022-29185
rustsec.org/advisories/RUSTSEC-2022-0018.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
42.5%