Vulnerability Name:
CVE-2013-7373 (CCN-86482)
Assigned:
2013-08-14
Published:
2013-08-14
Updated:
2014-04-30
Summary:
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
5.5 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
)
1.6 Low
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-200
Vulnerability Consequences:
Other
References:
Source: CCN
Type: Android Developer's Blog, 14 August 2013
Some SecureRandom Thoughts
Source: CONFIRM
Type: UNKNOWN
http://android-developers.blogspot.com.au/2013/08/some-securerandom-thoughts.html
Source: CCN
Type: Google Web site
Android
Source: MITRE
Type: CNA
CVE-2013-7373
Source: MISC
Type: UNKNOWN
http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/
Source: MLIST
Type: UNKNOWN
[openssl-dev] 20110415 recycled pids causes PRNG to repeat
Source: MLIST
Type: UNKNOWN
[openssl-dev] 20110416 Re: recycled pids causes PRNG to repeat
Source: MISC
Type: UNKNOWN
http://www.reddit.com/r/Android/comments/1k6f03/due_to_a_serious_encryptionrng_flaw_in_android/cblvum5
Source: CCN
Type: BID-61813
Google Android PRNG Entropy Weakness
Source: XF
Type: UNKNOWN
google-android-prng-weak-security(86482)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:google:android:1.0:*:*:*:*:*:*:*
OR
cpe:/o:google:android:1.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:1.5:*:*:*:*:*:*:*
OR
cpe:/o:google:android:1.6:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.0:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.0.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.2:rev1:*:*:*:*:*:*
OR
cpe:/o:google:android:2.2.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.2.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.2.3:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3:rev1:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.3:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.4:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.5:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.6:*:*:*:*:*:*:*
OR
cpe:/o:google:android:2.3.7:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.0:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.2.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.2.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.2.4:*:*:*:*:*:*:*
OR
cpe:/o:google:android:3.2.6:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.0:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.0.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.0.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.0.3:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.0.4:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.1.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.2.1:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.2.2:*:*:*:*:*:*:*
OR
cpe:/o:google:android:4.3:*:*:*:*:*:*:*
OR
cpe:/o:google:android:*:*:*:*:*:*:*:*
(Version <= 4.3.1)
Configuration CCN 1
:
cpe:/o:google:android:*:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
google
android 1.0
google
android 1.1
google
android 1.5
google
android 1.6
google
android 2.0
google
android 2.0.1
google
android 2.1
google
android 2.2
google
android 2.2 rev1
google
android 2.2.1
google
android 2.2.2
google
android 2.2.3
google
android 2.3
google
android 2.3 rev1
google
android 2.3.1
google
android 2.3.2
google
android 2.3.3
google
android 2.3.4
google
android 2.3.5
google
android 2.3.6
google
android 2.3.7
google
android 3.0
google
android 3.1
google
android 3.2
google
android 3.2.1
google
android 3.2.2
google
android 3.2.4
google
android 3.2.6
google
android 4.0
google
android 4.0.1
google
android 4.0.2
google
android 4.0.3
google
android 4.0.4
google
android 4.1
google
android 4.1.2
google
android 4.2
google
android 4.2.1
google
android 4.2.2
google
android 4.3
google
android *
google
android *