← Back to CVE List

CVE-2024-0436

Published: 2024-02-26T16:27Z
Last Modified: 2025-03-27T11:15Z
Source: MITRE CVE List
License: MITRE-CVE-TOS
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute > MITRE Terms of Use apply – see LICENSE‑MITRE.txt