Timing Attack Affecting cmov package, versions <0.4.4


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-CMOV-15032760
  • published18 Jan 2026
  • disclosed15 Jan 2026
  • creditNicsTr

Introduced: 15 Jan 2026

NewCVE-2026-23519  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade cmov to version 0.4.4 or higher.

Overview

Affected versions of this package are vulnerable to Timing Attack via the cmovnz function when compiled for the thumbv6m-none-eabi target, which results in non-constant time assembly being emitted. An attacker can potentially infer sensitive information by performing timing analysis on the affected process.

PoC

#![no_std]
use cmov::Cmov;

#[inline(never)]
pub fn test_ct_cmov(a: &mut u8, b: u8, c: u8) {
    a.cmovnz(&b, c);
}

References

CVSS Base Scores

version 4.0
version 3.1