3.6
CVSSv2

CVE-2021-39246

Published: 24/09/2021 Updated: 01/10/2021
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.1 | Impact Score: 5.2 | Exploitability Score: 0.9
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Tor Browser up to and including 10.5.6 and 11.x up to and including 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

torproject tor_browser

torproject tor_browser 11.0