// For flags

CVE-2021-27913

Use of a Broken or Risky Cryptographic Algorithm

Severity Score

3.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.

La función mt_rand es usada para generar tokens de sesión, esta función es criptográficamente defectuosa debido a que su naturaleza es una pseudoaleatoriedad, un atacante puede aprovechar la naturaleza criptográficamente no segura de esta función para enumerar tokens de sesión para cuentas que no están bajo su control. Este problema afecta a: Mautic versiones anteriores a 3.3.4; versiones anteriores a 4.0.0.

*Credits: Reported by Michael Rowley https://github.com/michaellrowley, Fixed by Mohit Aghera https://github.com/mohit-rocks
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-03-02 CVE Reserved
  • 2021-08-30 CVE Published
  • 2023-03-23 EPSS Updated
  • 2024-09-16 CVE Updated
  • 2024-09-16 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
  • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Acquia
Search vendor "Acquia"
Mautic
Search vendor "Acquia" for product "Mautic"
< 3.3.4
Search vendor "Acquia" for product "Mautic" and version " < 3.3.4"
-
Affected
Acquia
Search vendor "Acquia"
Mautic
Search vendor "Acquia" for product "Mautic"
4.0.0
Search vendor "Acquia" for product "Mautic" and version "4.0.0"
alpha1
Affected
Acquia
Search vendor "Acquia"
Mautic
Search vendor "Acquia" for product "Mautic"
4.0.0
Search vendor "Acquia" for product "Mautic" and version "4.0.0"
beta
Affected
Acquia
Search vendor "Acquia"
Mautic
Search vendor "Acquia" for product "Mautic"
4.0.0
Search vendor "Acquia" for product "Mautic" and version "4.0.0"
rc
Affected