Vulnerabilities > CVE-2018-12975 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Cryptosaga

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
cryptosaga
CWE-338

Summary

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

Vulnerable Configurations

Part Description Count
Application
Cryptosaga
1