In RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java, an incorrect implementation could cause weak RSA key pairs being generated. This could lead to crypto vulnerability with no additional execution privileges needed. User interaction is not needed for exploitation. Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard.
References
Link | Resource |
---|---|
https://source.android.com/docs/security/bulletin/pixel/2018-07-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Dec 2024, 20:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Google android
|
|
CPE | cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* |
|
References | () https://source.android.com/docs/security/bulletin/pixel/2018-07-01 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Information
Published : 2024-12-02 22:15
Updated : 2024-12-18 20:21
NVD link : CVE-2018-9426
Mitre link : CVE-2018-9426
CVE.ORG link : CVE-2018-9426
JSON object : View
Products Affected
- android
CWE
CWE-331
Insufficient Entropy