{"id":"CVE-2022-31742","details":"An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.","modified":"2026-04-16T04:35:29.743715797Z","published":"2022-12-22T20:15:29.277Z","related":["SUSE-SU-2022:1920-1","SUSE-SU-2022:1921-1","SUSE-SU-2022:1927-1","SUSE-SU-2022:2062-1","openSUSE-SU-2024:12117-1","openSUSE-SU-2024:12121-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1730434"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"101"}]},{"events":[{"introduced":"0"},{"fixed":"91.10"}]},{"events":[{"introduced":"0"},{"fixed":"91.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31742.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}