CVE Vulnerabilities

CVE-2020-28597

Predictable Seed in Pseudo-Random Number Generator (PRNG)

Published: Mar 03, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

A predictable seed vulnerability exists in the password reset functionality of Epignosis EfrontPro 5.2.21. By predicting the seed it is possible to generate the correct password reset 1-time token. An attacker can visit the password reset supplying the password reset token to reset the password of an account of their choice.

Weakness

A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.

Affected Software

Name Vendor Start Version End Version
Efront Epignosishq 5.2.17 (including) 5.2.17 (including)
Efront Epignosishq 5.2.21 (including) 5.2.21 (including)

Potential Mitigations

References