CVE-2024-35313

7.3 HIGH

📋 TL;DR

This vulnerability in Tor Arti allows circuits to incorrectly have a length of 3 when full vanguards are enabled, potentially reducing anonymity protections. It affects users running Tor Arti versions before 1.2.3. The issue could allow attackers to more easily deanonymize Tor users.

💻 Affected Systems

Products:
  • Tor Arti
Versions: All versions before 1.2.3
Operating Systems: All platforms running Tor Arti
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using full vanguards feature

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could deanonymize Tor users by exploiting shorter-than-expected circuit lengths, compromising privacy and potentially exposing user identities.

🟠

Likely Case

Reduced anonymity protection for Tor users, making traffic analysis and deanonymization attacks more feasible.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated and normal circuit length protections are restored.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network position and timing to observe circuit behavior

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.3

Vendor Advisory: https://gitlab.torproject.org/tpo/core/arti/-/issues/1400

Restart Required: Yes

Instructions:

1. Update Tor Arti to version 1.2.3 or later
2. Restart the Arti service
3. Verify the update was successful

🔧 Temporary Workarounds

Disable full vanguards

all

Temporarily disable the full vanguards feature until patching is possible

arti --disable-full-vanguards

🧯 If You Can't Patch

  • Consider using alternative Tor implementations temporarily
  • Monitor for unusual network activity or connection patterns

🔍 How to Verify

Check if Vulnerable:

Check Arti version with 'arti --version' and verify it's below 1.2.3

Check Version:

arti --version

Verify Fix Applied:

Confirm version is 1.2.3 or higher with 'arti --version'

📡 Detection & Monitoring

Log Indicators:

  • Unexpected circuit length of 3 in logs
  • Vanguard-related errors

Network Indicators:

  • Shorter-than-expected Tor circuit paths

SIEM Query:

Search for 'circuit length 3' or 'vanguard' in Arti logs

🔗 References

📤 Share & Export