{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6478","assignerOrgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","state":"PUBLISHED","assignerShortName":"PostgreSQL","dateReserved":"2026-04-17T00:44:57.549Z","datePublished":"2026-05-14T13:00:13.174Z","dateUpdated":"2026-05-14T15:33:03.332Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","shortName":"PostgreSQL","dateUpdated":"2026-05-14T13:00:13.174Z"},"title":"PostgreSQL discloses MD5-hashed passwords via covert timing channel","descriptions":[{"lang":"en","value":"Covert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate.  This does not affect scram-sha-256 passwords, the default in all supported releases.  However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected."}],"affected":[{"defaultStatus":"unaffected","product":"PostgreSQL","vendor":"n/a","versions":[{"lessThan":"18.4","status":"affected","version":"18","versionType":"rpm"},{"lessThan":"17.10","status":"affected","version":"17","versionType":"rpm"},{"lessThan":"16.14","status":"affected","version":"16","versionType":"rpm"},{"lessThan":"15.18","status":"affected","version":"15","versionType":"rpm"},{"lessThan":"14.23","status":"affected","version":"0","versionType":"rpm"}]}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-385","type":"CWE","description":"Covert Timing Channel"}]}],"references":[{"url":"https://www.postgresql.org/support/security/CVE-2026-6478/"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"configurations":[{"lang":"en","value":"victim user has a usable MD5 password"}],"workarounds":[{"lang":"en","value":"reset password with password_encryption=scram-sha-256"}],"credits":[{"lang":"en","value":"The PostgreSQL project thanks Joe Conway for reporting this problem."}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-14T15:32:42.868340Z","id":"CVE-2026-6478","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-14T15:33:03.332Z"}}]}}