
Cloud Vulnerability DB
A community-led vulnerabilities database
In Rhonabwy through version 1.1.13, a security vulnerability was discovered in the HMAC signature verification process. The vulnerability stems from the use of a strcmp function that is susceptible to side-channel attacks, as it terminates comparison when encountering the first difference between two signatures (NVD).
The vulnerability is classified with a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue lies in the signature comparison mechanism where the strcmp function stops comparing when it encounters the first difference between signatures, potentially leaking timing information. This weakness is categorized under CWE-203 (Observable Discrepancy) and CWE-1255 (Comparison Logic is Vulnerable to Power Side-Channel Attacks) (NVD).
The side-channel vulnerability in the HMAC signature verification process could allow attackers to gather timing information about the signature comparison, potentially leading to the ability to forge valid signatures. This could compromise the security of the signature verification mechanism (NVD).
The vulnerability has been fixed by replacing the vulnerable strcmp function with gnutls_memcmp, which provides constant-time execution for signature comparison. Users should upgrade to a version that includes this fix (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."