Vulnerabilities > Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

DATE CVE VULNERABILITY TITLE RISK
2022-02-04 CVE-2013-20003 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Silabs products
Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.
7.9
2022-01-25 CVE-2021-43799 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Zulip
Zulip is an open-source team collaboration tool.
network
low complexity
zulip CWE-338
5.0
2021-12-25 CVE-2021-45484 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Netbsd
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG.
network
low complexity
netbsd CWE-338
7.5
2021-12-25 CVE-2021-45489 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Netbsd
In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG.
network
low complexity
netbsd CWE-338
5.0
2021-12-01 CVE-2021-3990 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
network
showdoc CWE-338
4.3
2021-10-27 CVE-2011-4574 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Polarssl
PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm.
network
low complexity
polarssl CWE-338
7.5
2021-09-23 CVE-2021-22948 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Revive-Adserver Revive Adserver
Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function.
network
low complexity
revive-adserver CWE-338
7.1
2021-08-30 CVE-2021-27913 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Acquia Mautic
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
network
acquia CWE-338
3.5
2021-08-06 CVE-2021-37553 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Jetbrains Youtrack
In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used.
network
low complexity
jetbrains CWE-338
5.0
2021-08-04 CVE-2021-3678 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
network
showdoc CWE-338
4.3