Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-385 (隐蔽时间通道) — Vulnerability Class 26

26 vulnerabilities classified as CWE-385 (隐蔽时间通道). AI Chinese analysis included.

CWE-385 represents a timing-based information leakage weakness where sensitive data is transmitted indirectly by manipulating system behavior over time. Attackers typically exploit this by monitoring the duration of specific operations, such as cryptographic comparisons or database queries, to infer protected information like secret keys or user credentials. Since the timing variations correlate with internal state differences, an external observer can reconstruct private data without direct access to the memory or network traffic. Developers mitigate this risk by implementing constant-time algorithms that ensure execution time remains independent of secret inputs. Additionally, introducing random delays or padding operations can obscure timing patterns, making it significantly harder for adversaries to correlate observed delays with specific internal processes or data values.

MITRE CWE Description
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information. In some instances, knowing when data is transmitted between parties can provide a malicious user with privileged information. Also, externally monitoring the timing of operations can potentially reveal sensitive data. For example, a cryptographic operation can expose its internal state if the time it takes to perform the operation varies, based on the state. Covert channels are frequently classified as either storage or timing channels. Some examples of covert timing channels are the system's paging rate, the time a certain transaction requires to execute, and the time it takes to gain access to a shared bus.
Common Consequences (1)
Confidentiality, OtherRead Application Data, Other
Information exposure.
Mitigations (3)
Architecture and DesignWhenever possible, specify implementation strategies that do not introduce time variances in operations.
ImplementationOften one can artificially manipulate the time which operations take or -- when operations occur -- can remove information from the attacker.
ImplementationIt is reasonable to add artificial or random delays so that the amount of CPU time consumed is independent of the action being taken by the application.
Examples (1)
In this example, the attacker observes how long an authentication takes when the user types in the correct password.
def validate_password(actual_pw, typed_pw): if len(actual_pw) <> len(typed_pw): return 0 for i in len(actual_pw): if actual_pw[i] <> typed_pw[i]: return 0 return 1
Bad · Python
CVE IDTitleCVSSSeverityPublished
CVE-2026-5598 Non-constant time comparisons risk private key leakage in FrodoKEM. — BC-JAVA 5.9 -2026-04-15
CVE-2025-59425 vLLM vulnerable to timing attack at bearer auth — vllm 7.5 High2025-10-07
CVE-2025-9231 Timing side-channel in SM2 algorithm on 64 bit ARM — OpenSSL 5.9AIMediumAI2025-09-30
CVE-2025-49087 Mbed TLS 安全漏洞 — mbedtls 4.0 Medium2025-07-20
CVE-2024-13176 Timing side-channel in ECDSA signature computation — OpenSSL 4.7 -2025-01-20
CVE-2025-0306 Ruby: openssl: ruby marvin attack 7.4 High2025-01-09
CVE-2024-11862 Devolutions XTS.NET 安全漏洞 — XTS.NET--AI2024-11-27
CVE-2023-33855 IBM Common Cryptographic Architecture information disclosure — Common Cryptographic Architecture 3.7 Low2024-03-26
CVE-2024-25964 Dell PowerScale OneFS 安全漏洞 — PowerScale OneFS 5.3 Medium2024-03-25
CVE-2024-2236 Libgcrypt: vulnerable to marvin attack 5.9 Medium2024-03-06
CVE-2023-49092 RustCrypto/RSA vulnerable to a Marvin Attack via key recovery through timing sidechannels — RSA 5.9 Medium2023-11-28
CVE-2020-35166 Dell BSAFE 安全漏洞 — BSAFE Crypto-C Micro Edition 5.1 Medium2022-07-11
CVE-2020-35164 Dell BSAFE 安全漏洞 — Dell BSAFE Crypto-C Micro Edition 6.7 Medium2022-07-11
CVE-2020-29506 Dell BSAFE 安全漏洞 — Dell BSAFE Crypto-C Micro Edition 6.8 Medium2022-07-11
CVE-2022-24409 DELL BSAFE SSL-J 安全漏洞 — Dell BSAFE SSL-J 5.9 Medium2022-02-23
CVE-2020-25657 m2crypto 安全漏洞 — m2crypto 5.9 -2021-01-12
CVE-2020-14341 Red Hat Single Sign-On 安全漏洞 — Red Hat Single Sign-On 2.7 -2021-01-12
CVE-2020-25659 python-cryptography 安全漏洞 — python-cryptography 5.9 -2021-01-11
CVE-2020-25658 Python-RSA 加密问题漏洞 — python-rsa 7.5 High2020-11-12
CVE-2019-19338 Linux kernel 安全漏洞 — Linux Kernel 6.5 -2020-07-13
CVE-2019-3732 Dell RSA BSAFE Micro Edition Suite和RSA BSAFE Crypto-C Micro Edition 信息泄露漏洞 — RSA BSAFE Crypto-C Micro Edition 7.5 -2019-09-30
CVE-2016-7056 OpenSSL 加密问题漏洞 — openssl 5.5 -2018-09-10
CVE-2018-10846 GnuTLS implementation 加密问题漏洞 — gnutls 5.9 -2018-08-22
CVE-2018-10845 GnuTLS implementation加密问题漏洞 — gnutls 5.9 -2018-08-22
CVE-2018-10844 GnuTLS implementation加密问题漏洞 — gnutls 5.9 -2018-08-22
CVE-2017-2624 X.org X Server 信息泄露漏洞 — xorg-x11-server 6.7 -2018-07-27

Vulnerabilities classified as CWE-385 (隐蔽时间通道) represent 26 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.