Upstream information
Description
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 3.6 | 
| Vector | AV:L/AC:L/Au:N/C:P/I:P/A:N | 
| Access Vector | Local | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | None | 
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 6.1 | 
| Vector | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 
| Attack Vector | Physical | 
| Attack Complexity | Low | 
| Privileges Required | None | 
| User Interaction | None | 
| Scope | Unchanged | 
| Confidentiality Impact | High | 
| Integrity Impact | High | 
| Availability Impact | None | 
| CVSSv3 Version | 3.1 | 
SUSE Timeline for this CVE
CVE page created: Sat Sep 25 00:00:02 2021CVE page last modified: Mon Oct 6 19:31:03 2025
