5.3

CVE-2024-53702

Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SonicwallSma 200 Firmware Version < 10.2.1.14-75sv
   SonicwallSma 200 Version-
SonicwallSma 210 Firmware Version < 10.2.1.14-75sv
   SonicwallSma 210 Version-
SonicwallSma 400 Firmware Version < 10.2.1.14-75sv
   SonicwallSma 400 Version-
SonicwallSma 410 Firmware Version < 10.2.1.14-75sv
   SonicwallSma 410 Version-
SonicwallSma 500v Firmware Version < 10.2.1.14-75sv
   SonicwallSma 500v Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.37% 0.59
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.