rumqttc is vulnerable to Timing Attacks
25
Low Risk
Affected versions of this package are vulnerable to timing attacks because they rely on non-constant-time password comparisons. The fixed version mitigates this issue by introducing constant-time password comparison in rumqttd, preventing attackers from inferring sensitive information through response time analysis.
You are affected if you are using a version that falls within the vulnerable range.
rumqttc is vulnerable to Timing Attacks in versions 0.0.1 - 0.24.0.
Upgrade the rumqttc library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant