5.3
CVE-2024-53702
- EPSS 0.1%
- Veröffentlicht 05.12.2024 14:15:21
- Zuletzt bearbeitet 04.11.2025 17:13:12
- Quelle PSIRT@sonicwall.com
- CVE-Watchlists
- Unerledigt
Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sonicwall ≫ Sma 200 Firmware Version < 10.2.1.14-75sv
Sonicwall ≫ Sma 210 Firmware Version < 10.2.1.14-75sv
Sonicwall ≫ Sma 400 Firmware Version < 10.2.1.14-75sv
Sonicwall ≫ Sma 410 Firmware Version < 10.2.1.14-75sv
Sonicwall ≫ Sma 500v Firmware Version < 10.2.1.14-75sv
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.276 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.