Timing side-channel in HMAC verification in Node.js

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2026-009 CVE-2026-21713 03/24/2026 low v1

Vulnerability details

A flaw in Node.js HMAC verification can potentially leaking timing information

Impacted products

ProductsSeverityDetail
Stormshield Management Center low SMC is impacted

Revisions

Version Date Description
v1 Initial release


Stormshield Management Center

CVSS v3.1 Overall Score: 3.7      

Analysis

Impacted version

SMC is not directly affected by this vulnerability, but a component used by the project is affected

  • SMC < 3.9.1

Workaround solution

Solution

There is no workaround solution.

The SMC 3.9.1 update will fix this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network High High None Unchanged High None None
CVSS Base score: 4.2 CVSS Vector: (AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 3.7 CVSS Vector: (AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Confidentiality Requirement (CR) Integrity Requirement (IR) Availability Requirement (AR)
Medium Low Low
CVSS Environmental score: 3.7 CVSS Vector: (AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C/CR:M/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)