{"id":"CVE-2024-21671","summary":"vantage6 username timing attack","details":"The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC).  It is possible to find out usernames from the response time of login requests. This could aid attackers in credential attacks.  Version 4.2.0 patches this vulnerability.","aliases":["GHSA-45gq-q4xh-cp53","PYSEC-2024-31"],"modified":"2026-04-10T05:08:58.497068Z","published":"2024-01-30T15:43:06.789Z","database_specific":{"cwe_ids":["CWE-208"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/21xxx/CVE-2024-21671.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/21xxx/CVE-2024-21671.json"},{"type":"ADVISORY","url":"https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21671"},{"type":"FIX","url":"https://github.com/vantage6/vantage6/commit/389f416c445da4f2438c72f34c3b1084485c4e30"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vantage6/vantage6","events":[{"introduced":"0"},{"fixed":"2067fc452977ce067838da6c5bd47733d8198aed"}]}],"versions":["v3.4.0","v3.4.0a2","v3.4.0a3","v3.4.0a4","v3.4.0a6","v3.4.1","v3.4.1a0","v3.4.1a1","v3.4.1a2","v3.4.1a3","v3.4.2","v3.4.2a0","v3.4.3","v3.5.0","v3.5.0rc2","v3.5.0rc3","v3.5.1","v3.5.2","v3.6.1","v3.6.1rc1","v3.6.1rc2","v3.6.1rc3","v3.7.0","v3.7.0rc1","v3.7.0rc2","v3.7.1","v3.7.2","v3.7.3","v3.8.0rc2","v3.8.0rc3","version/0.0.0b3","version/3.10.0","version/3.10.1","version/3.10.2","version/3.10.3","version/3.10.4","version/3.3.0","version/3.3.0rc1","version/3.3.0rc2","version/3.3.0rc3","version/3.3.0rc4","version/3.3.1","version/3.3.2","version/3.3.3","version/3.3.4","version/3.3.5","version/3.3.6","version/3.3.7","version/3.3.8a1","version/3.3.8a2","version/3.3.8a3","version/3.3.8a4","version/3.3.8a5","version/3.3.8a6","version/3.3.8a7","version/3.3.8a8","version/3.3.8a9","version/3.4.0","version/3.4.0a0","version/3.4.0a1","version/3.4.0a2","version/3.4.0a3","version/3.4.0a4","version/3.4.0a5","version/3.4.0a6","version/3.4.1","version/3.4.1a0","version/3.4.1a1","version/3.4.1a2","version/3.4.1a3","version/3.4.2","version/3.4.2a0","version/3.4.3","version/3.5.0","version/3.5.0rc2","version/3.5.0rc3","version/3.5.1","version/3.5.2","version/3.6.1","version/3.6.1rc1","version/3.6.1rc2","version/3.6.1rc3","version/3.7.0","version/3.7.0rc1","version/3.7.0rc2","version/3.7.1","version/3.7.2","version/3.7.3","version/3.8.0rc2","version/3.8.0rc3","version/3.9.0","version/3.9.0rc1","version/3.9.0rc2","version/3.9.0rc3","version/3.9.0rc4","version/4.0.3","version/4.1.0","version/4.1.1","version/4.1.2rc1","version/4.2.0rc1","version/4.2.0rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21671.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}