An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); DevTools remote secret comparison. Versions that are no longer supported are also affected per vendor advisory.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-40972 |
|
History
Thu, 30 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Boot |
|
| CPEs | cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Boot |
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Timing Attack on Spring Boot Remote Secret Comparison Enables Remote Code Execution | |
| Metrics |
ssvc
|
Tue, 28 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spring
Spring spring Boot |
|
| Vendors & Products |
Spring
Spring spring Boot |
Mon, 27 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); DevTools remote secret comparison. Versions that are no longer supported are also affected per vendor advisory. | |
| Weaknesses | CWE-208 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published: 2026-04-27T23:15:19.194Z
Updated: 2026-04-29T03:55:44.263Z
Reserved: 2026-04-16T02:18:56.133Z
Link: CVE-2026-40972
Updated: 2026-04-28T12:45:23.300Z
Status : Analyzed
Published: 2026-04-28T00:16:24.210
Modified: 2026-04-30T14:26:30.880
Link: CVE-2026-40972
No data.