Vulnerability Description
In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Memcached | Memcached | < 1.6.42 |
Related Weaknesses (CWE)
References
- https://github.com/memcached/memcached/commit/d13f282b4bce33a9c33b8a1bbf07f12114Patch
- https://github.com/memcached/memcached/compare/1.6.41...1.6.42Release Notes
- https://github.com/memcached/memcached/wiki/ReleaseNotes1642Release Notes
FAQ
What is CVE-2026-47783?
CVE-2026-47783 is a vulnerability with a CVSS score of 8.1 (HIGH). In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
How severe is CVE-2026-47783?
CVE-2026-47783 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-47783?
Check the references section above for vendor advisories and patch information. Affected products include: Memcached Memcached.