5.9

CVE-2024-30171

An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerbouncycastle
Produkt bouncy_castle_for_java
Default Statusunknown
Version < 1.78
Version 0
Status affected
Herstellernetapp
Produkt active_iq_unified_manager
Default Statusunknown
Version < *
Version 0
Status affected
Herstellernetapp
Produkt bluexp
Default Statusunknown
Version < *
Version 0
Status affected
Herstellernetapp
Produkt ontap_tools
Default Statusunknown
Version 9
Status affected
Herstellernetapp
Produkt oncommand_workflow_automation
Default Statusunknown
Version < *
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.193
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-203 Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.