Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.4.0.
The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable.
Users are recommended to upgrade to version 1.4.1, which fixes the issue.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/sz2d0z39k01nbx3r9pj65t76o1hy9491 | Mailing List Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2024/11/22/1 | Mailing List | 
Configurations
                    History
                    01 Jul 2025, 20:29
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CPE | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
| First Time | Apache answer Apache | |
| References | () https://lists.apache.org/thread/sz2d0z39k01nbx3r9pj65t76o1hy9491 - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/11/22/1 - Mailing List | 
22 Nov 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-22 15:15
Updated : 2025-07-01 20:29
NVD link : CVE-2024-45719
Mitre link : CVE-2024-45719
CVE.ORG link : CVE-2024-45719
JSON object : View
Products Affected
                apache
- answer
CWE
                
                    
                        
                        CWE-326
                        
            Inadequate Encryption Strength
