CVE-2025-53940
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-24

Last updated on: 2025-07-25

Assigner: GitHub, Inc.

Description
Quiet is an alternative to team chat apps like Slack, Discord, and Element that does not require trusting a central server or running one's own. In versions 6.1.0-alpha.4 and below, Quiet's API for backend/frontend communication was using an insecure, not constant-time comparison function for token verification. This allowed for a potential timing attack where an attacker would try different token values and observe tiny differences in the response time (wrong characters fail faster) to guess the whole token one character at a time. This is fixed in version 6.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-24
Last Modified
2025-07-25
Generated
2026-05-07
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tryquiet quiet 6.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-208 Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Quiet versions 6.1.0-alpha.4 and below, where the API for backend/frontend communication used an insecure, non-constant-time comparison function for token verification. This flaw allows an attacker to perform a timing attack by trying different token values and measuring tiny differences in response times to guess the entire token one character at a time.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability could potentially guess authentication tokens by measuring response times, which may lead to unauthorized access or impersonation within the Quiet application, compromising the security of communications.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Quiet to version 6.0.1 or later, as this version fixes the insecure token verification function that allowed timing attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart