Vulnerabilities > CVE-2017-18021 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Qtpass
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
It was discovered that QtPass before 1.2.1, when using the built-in password generator, generates possibly predictable and enumerable passwords. This only applies to the QtPass GUI.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
References
- https://github.com/IJHack/QtPass/issues/338
- https://github.com/IJHack/QtPass/issues/338
- https://github.com/IJHack/QtPass/releases/tag/v1.2.1
- https://github.com/IJHack/QtPass/releases/tag/v1.2.1
- https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html
- https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html
- https://qtpass.org/
- https://qtpass.org/