Description
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Published: 2021-09-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-25608 Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
History

No history.

Subscriptions

Apple Macos
Linux Linux Kernel
Microsoft Windows
Torproject Tor Browser
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T02:06:42.498Z

Reserved: 2021-08-17T00:00:00.000Z

Link: CVE-2021-39246

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-24T19:15:07.147

Modified: 2024-11-21T06:19:00.780

Link: CVE-2021-39246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses