CVE-2017-9735
moderate-risk
Published 2017-06-16
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (15)
References (26)
Third Party Advisory
http://www.securityfocus.com/bid/99104
Issue Tracking
https://bugs.debian.org/864631
Issue Tracking
https://github.com/eclipse/jetty.project/issues/1556
Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html
Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
Third Party Advisory
http://www.securityfocus.com/bid/99104
Issue Tracking
https://bugs.debian.org/864631
Issue Tracking
https://github.com/eclipse/jetty.project/issues/1556
and 6 more references
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
18/34 · Moderate