Vulnerabilities > CVE-2022-35255 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in multiple products

047910
CVSS 9.1 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
NONE
network
low complexity
nodejs
siemens
debian
CWE-338
critical

Summary

A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.

Vulnerable Configurations

Part Description Count
Application
Nodejs
60
Application
Siemens
4
OS
Debian
1