7.5
CVE-2016-10743
- EPSS 0.46%
 - Published 23.03.2019 19:29:00
 - Last modified 21.11.2024 02:44:38
 - Source cve@mitre.org
 - CVE-Watchlists
 - Open
 
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
| Type | Source | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.46% | 0.61 | 
| Source | Base Score | Exploit Score | Impact Score | Vector string | 
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 | 
                 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N  
             | 
        
| nvd@nist.gov | 5 | 10 | 2.9 | 
                 AV:N/AC:L/Au:N/C:N/I:P/A:N  
             | 
        
CWE-332 Insufficient Entropy in PRNG
The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.