Affecting versions did not compare tokens in constant time, which could make it possible for an attacker to guess the 2fa token of a user.
This has been fixed by using using the crate constanttimeeq for comparison.
{ "license": "CC0-1.0" }
{ "affected_functions": null, "affects": { "os": [], "functions": [ "totp_rs::TOTP::check" ], "arch": [] } }
{ "cvss": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "informational": null, "categories": [ "crypto-failure" ] }