CVE-2024-1579
Insufficient seeding of random number generator
Severity Score
8.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Secomea GateManager (Webserver modules) allows Session Hijacking.This issue affects GateManager: before 11.2.624071020.
El uso incorrecto de semillas en la vulnerabilidad del generador de números pseudoaleatorios (PRNG) en Secomea GateManager (módulos de servidor web) permite el secuestro de sesión. Este problema afecta a GateManager: antes de 11.2.624071020.
*Credits:
Researchers at Paderborn University and Ruhr University Bochum
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-02-16 CVE Reserved
- 2024-04-29 CVE Published
- 2024-04-30 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
CAPEC
- CAPEC-593: Session Hijacking
References (1)
URL | Tag | Source |
---|---|---|
https://www.secomea.com/support/cybersecurity-advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Secomea Search vendor "Secomea" | GateManager Search vendor "Secomea" for product "GateManager" | < 11.2.624071020 Search vendor "Secomea" for product "GateManager" and version " < 11.2.624071020" | en |
Affected
|