tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-09-06 05:15
Updated : 2024-11-30 12:15
NVD link : CVE-2024-45751
Mitre link : CVE-2024-45751
CVE.ORG link : CVE-2024-45751
JSON object : View
Products Affected
No product.
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)