2 results (0.004 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. • https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf https://lists.debian.org/debian-lts-announce/2023/11/msg00025.html https://access.redhat.com/security/cve/CVE-2023-46233 https://bugzilla.redhat.com/show_bug.cgi?id=2246369 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-328: Use of Weak Hash CWE-916: Use of Password Hash With Insufficient Computational Effort •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 2

The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary. • https://github.com/miguelc49/CVE-2020-36732-2 https://github.com/miguelc49/CVE-2020-36732-1 https://github.com/brix/crypto-js/compare/3.2.0...3.2.1 https://github.com/brix/crypto-js/issues/254 https://github.com/brix/crypto-js/issues/256 https://github.com/brix/crypto-js/pull/257/commits/e4ac157d8b75b962d6538fc0b996e5d4d5a9466b https://security.netapp.com/advisory/ntap-20230706-0003 https://security.snyk.io/vuln/SNYK-JS-CRYPTOJS-548472 • CWE-330: Use of Insufficiently Random Values •