Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
2021-09-24T19:15:07.147
2024-11-21T06:19:00.780
Modified
CVSSv3.1: 6.1 (MEDIUM)
AV:L/AC:L/Au:N/C:P/I:P/A:N
3.9
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | torproject | tor_browser | ≤ 10.5.6 | Yes |
Application | torproject | tor_browser | 11.0 | Yes |
Application | torproject | tor_browser | 11.0 | Yes |
Operating System | apple | macos | - | No |
Operating System | linux | linux_kernel | - | No |
Operating System | microsoft | windows | - | No |