Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25189: n/a

0
Critical
VulnerabilityCVE-2024-25189cvecve-2024-25189
Published: Thu Feb 08 2024 (02/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:30:53 UTC

Technical Analysis

CVE-2024-25189 identifies a critical security vulnerability in libjwt version 1.15.3, a widely used library for handling JSON Web Tokens (JWTs). The vulnerability arises because libjwt uses the standard strcmp function to verify authentication tokens. strcmp is not a constant-time function, meaning the time it takes to compare two strings can vary based on their content. This timing variance can be exploited by attackers to perform a timing side-channel attack, allowing them to infer valid authentication tokens by measuring response times. Such an attack can lead to authentication bypass without requiring any privileges or user interaction. The vulnerability affects confidentiality by potentially exposing sensitive token data, integrity by allowing unauthorized access, and availability by enabling attackers to bypass security controls. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with an attack vector of network, no required privileges, and no user interaction needed. Although no exploits have been reported in the wild yet, the vulnerability is straightforward to exploit given the nature of timing attacks and the widespread use of libjwt in various applications and services that rely on JWT for authentication and authorization.

Potential Impact

The impact of CVE-2024-25189 is severe for organizations worldwide that utilize libjwt for JWT authentication. Successful exploitation allows attackers to bypass authentication controls, potentially gaining unauthorized access to sensitive systems and data. This can lead to data breaches, unauthorized transactions, privilege escalation, and disruption of services. Since JWTs are commonly used in web applications, APIs, and microservices architectures, the vulnerability could compromise a wide range of environments including cloud services, enterprise applications, and embedded systems. The lack of required privileges and user interaction lowers the barrier for attackers, increasing the risk of automated or remote exploitation. Organizations relying on libjwt in critical infrastructure or handling sensitive personal or financial data face heightened risks of confidentiality loss, data integrity violations, and service availability degradation.

Mitigation Recommendations

To mitigate CVE-2024-25189, organizations should immediately audit their use of libjwt and identify affected versions, particularly version 1.15.3. The primary remediation is to update libjwt to a version where the strcmp function is replaced with a constant-time comparison function designed to prevent timing side-channel attacks. If an official patch is not yet available, developers should implement a custom constant-time string comparison for authentication verification. Additionally, applying compensating controls such as rate limiting, anomaly detection for authentication attempts, and enhanced logging can help detect and prevent exploitation attempts. Security teams should monitor libjwt project repositories and vulnerability advisories for patches or updates. Finally, reviewing JWT usage patterns and enforcing strict token validation policies can reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d61b7ef31ef0b571ac4

Added to database: 2/25/2026, 9:45:05 PM

Last enriched: 2/26/2026, 10:30:53 AM

Last updated: 4/12/2026, 8:33:35 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses