biscuitsec CVE Vulnerabilities & Metrics

Focus on biscuitsec vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About biscuitsec Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with biscuitsec. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total biscuitsec CVEs: 2
Earliest CVE date: 13 Jun 2022, 20:15 UTC
Latest CVE date: 01 Aug 2024, 22:15 UTC

Latest CVE reference: CVE-2024-41949

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical biscuitsec CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.75

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 0
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS biscuitsec CVEs

These are the five CVEs with the highest CVSS scores for biscuitsec, sorted by severity first and recency.

All CVEs for biscuitsec

CVE-2024-41949 biscuitsec vulnerability CVSS: 0 01 Aug 2024, 22:15 UTC

biscuit-rust is the Rust implementation of Biscuit, an authentication and authorization token for microservices architectures. Third-party blocks can be generated without transferring the whole token to the third-party authority. Instead, a ThirdPartyBlock request can be sent, providing only the necessary info to generate a third-party block and to sign it, which includes the public key of the previous block (used in the signature) and the public keys part of the token symbol table (for public key interning in datalog expressions). A third-part block request forged by a malicious user can trick the third-party authority into generating datalog trusting the wrong keypair.

CVE-2022-31053 biscuitsec vulnerability CVSS: 7.5 13 Jun 2022, 20:15 UTC

Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid Γ-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification. There are no known workarounds for this issue.