tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.
References
Configurations
No configuration.
History
30 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-338 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
21 Nov 2024, 09:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Sep 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Sep 2024, 12:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Sep 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-06 05:15
Updated : 2024-11-30 12:15
NVD link : CVE-2024-45751
Mitre link : CVE-2024-45751
CVE.ORG link : CVE-2024-45751
JSON object : View
Products Affected
No product.
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)