In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
Loading...
Loading...
Score 8.1 from GitHub Security Advisory (severity: HIGH) published 2026-05-20. NVD baseline CVSS 8.1; sources differ by 0.0.
In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
May 20, 2026
May 21, 2026
These vendors published their own advisory mentioning this CVE — often with vendor-specific remediation steps + affected product lists not in NVD.
In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
In memcached before 1.6.42, username data for SASL password database authentication has a timing...
See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-47783
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.