CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks
low-riskA device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.
Abstraction: Variant
Common Consequences
Confidentiality
→
Modify Memory
Real-World Examples (2)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-25714 | 9.8 | 0.2% | — |
| CVE-2024-39920 | 4.3 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal