CVE Vulnerabilities

CVE-2021-32033

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)

Published: Jun 16, 2021 | Modified: Jul 12, 2022
CVSS 3.x
4.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

Protectimus SLIM NFC 70 10.01 devices allow a Time Traveler attack in which attackers can predict TOTP passwords in certain situations. The time value used by the device can be set independently from the used seed value for generating time-based one-time passwords, without authentication. Thus, an attacker with short-time physical access to a device can set the internal real-time clock (RTC) to the future, generate one-time passwords, and reset the clock to the current time. This allows the generation of valid future time-based one-time passwords without having further access to the hardware token.

Weakness

The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.

Affected Software

Name Vendor Start Version End Version
Slim_nfc_70_firmware Protectimus 10.01 (including) 10.01 (including)

Extended Description

       PRNGs are deterministic and, while their output appears
       random, they cannot actually create entropy. They rely on
       cryptographically secure and unique seeds for entropy so
       proper seeding is critical to the secure operation of the
       PRNG.

       Management of seeds could be broken down into two main areas:
	   

		 
		 
	   

           PRNGs require a seed as input to generate a stream of
           numbers that are functionally indistinguishable from
           random numbers.  While the output is, in many cases,
           sufficient for cryptographic uses, the output of any
           PRNG is directly determined by the seed provided as
           input. If the seed can be ascertained by a third party,
           the entire output of the PRNG can be made known to
           them. As such, the seed should be kept secret and
           should ideally not be able to be guessed. For example,
           the current time may be a poor seed. Knowing the
           approximate time the PRNG was seeded greatly reduces
           the possible key space.
		 

           Seeds do not necessarily need to be unique, but reusing seeds may open up attacks if the seed is discovered.

References