Jervis Has Weak Random for Timing Attack Mitigation
Description
Published to the GitHub Advisory Database
Jan 13, 2026
Reviewed
Jan 13, 2026
Published by the National Vulnerability Database
Jan 13, 2026
Last updated
Jan 13, 2026
Vulnerability
https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L593-L594
Uses
java.util.Random()which is not cryptographically secure.Impact
If an attacker can predict the random delays, they may still be able to perform timing attacks.
Patches
Jervis will use
SecureRandomfor timing randomization.Upgrade to Jervis 2.2.
Workarounds
None
References
References