CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks

low-risk

A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.

Abstraction: Variant

Common Consequences

Confidentiality Modify Memory

Real-World Examples (2)

CVE CVSS EPSS KEV
CVE-2024-25714 9.8 0.2%
CVE-2024-39920 4.3 0.1%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal