A vulnerability, which was classified as problematic, has been found in enigmaX up to 2.2. This issue affects the function getSeed of the file main.c of the component Scrambling Table Handler. The manipulation leads to predictable seed in pseudo-random number generator (prng). The attack may be initiated remotely. Upgrading to version 2.3 is able to address this issue. The name of the patch is 922bf90ca14a681629ba0b807a997a81d70225b5. It is recommended to upgrade the affected component. The identifier VDB-217181 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.217181 | Third Party Advisory |
https://vuldb.com/?id.217181 | Third Party Advisory |
https://github.com/pfmonville/enigmaX/commit/922bf90ca14a681629ba0b807a997a81d70225b5 | Patch Third Party Advisory |
https://github.com/pfmonville/enigmaX/releases/tag/2.3 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2023-01-02 00:15
Updated : 2023-01-09 09:55
NVD link : CVE-2016-15006
Mitre link : CVE-2016-15006
JSON object : View
CWE
CWE-337
Predictable Seed in Pseudo-Random Number Generator (PRNG)
Products Affected
enigmax_project
- enigmax