Vulnerability Name: | CVE-2013-7372 (CCN-95236) | ||||||||
Assigned: | 2013-08-11 | ||||||||
Published: | 2013-08-11 | ||||||||
Updated: | 2014-04-30 | ||||||||
Summary: | The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-310 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CONFIRM Type: Patch http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html Source: MITRE Type: CNA CVE-2013-7372 Source: CCN Type: Google Web site Android Source: MISC Type: Exploit http://www.nds.rub.de/media/nds/veroeffentlichungen/2013/03/25/paper_2.pdf Source: CCN Type: BID-68229 Apache Harmony PRNG Entropy Weakness Source: CONFIRM Type: Patch https://android.googlesource.com/platform/libcore/+/kitkat-release/luni/src/main/java/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java Source: CCN Type: Bitcoin Web site Android Security Vulnerability Source: MISC Type: UNKNOWN https://bitcoin.org/en/alert/2013-08-11-android Source: XF Type: UNKNOWN apache-harmony-cve20137372-sec-bypass(95236) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |