@cashu/cashu-ts is vulnerable to Observable Timing Discrepancy
30
Low Risk
Affected versions of this package are vulnerable to timing side-channel attacks due to non-constant-time comparison in DLEQ proof verification. The affected verifyDLEQProof logic compares byte arrays using standard equality checks that may return early on mismatch, causing observable timing differences based on the input. An attacker able to measure these timing variations can gradually infer valid proof values or secret-dependent data, potentially compromising the integrity of the verification process.
You are affected if you are using a version that falls within the vulnerable range.
@cashu/cashu-ts is vulnerable to Observable Timing Discrepancy in versions 2.5.0 - 3.6.2.
Upgrade the @cashu/cashu-ts library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant