CVE-2024-39920
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.
El protocolo TCP en RFC 9293 tiene un canal lateral de temporización que facilita a atacantes remotos inferir el contenido de una conexión TCP desde un sistema cliente (a cualquier servidor), cuando ese sistema cliente está obteniendo simultáneamente datos TCP a una velocidad lenta desde un servidor controlado por un atacante, también conocido como el problema "SnailLoad". Por ejemplo, el ataque puede comenzar midiendo los RTT a través de los segmentos TCP cuya función es proporcionar un bit de control ACK y un número de reconocimiento.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-07-03 CVE Reserved
- 2024-07-03 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks
CAPEC
References (8)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ietf Search vendor "Ietf" | Tcp Search vendor "Ietf" for product "Tcp" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
|