// For flags

CVE-2024-1579

Insufficient seeding of random number generator

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Secomea GateManager (Webserver modules) allows Session Hijacking.This issue affects GateManager: before 11.2.624071020.

El uso incorrecto de semillas en la vulnerabilidad del generador de números pseudoaleatorios (PRNG) en Secomea GateManager (módulos de servidor web) permite el secuestro de sesión. Este problema afecta a GateManager: antes de 11.2.624071020.

*Credits: Researchers at Paderborn University and Ruhr University Bochum
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-02-16 CVE Reserved
  • 2024-04-29 CVE Published
  • 2024-04-30 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
CAPEC
  • CAPEC-593: Session Hijacking
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Secomea
Search vendor "Secomea"
GateManager
Search vendor "Secomea" for product "GateManager"
< 11.2.624071020
Search vendor "Secomea" for product "GateManager" and version " < 11.2.624071020"
en
Affected