Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-9502

Summary
Assigner-dahua
Assigner Org ID-79ee569e-7d1e-4364-98f0-3a18e2a739ad
Published At-13 May, 2020 | 15:21
Updated At-04 Aug, 2024 | 10:34
Rejected At-
Credits

Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:dahua
Assigner Org ID:79ee569e-7d1e-4364-98f0-3a18e2a739ad
Published At:13 May, 2020 | 15:21
Updated At:04 Aug, 2024 | 10:34
Rejected At:
▼CVE Numbering Authority (CNA)

Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.

Affected Products
Vendor
n/a
Product
IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S
Versions
Affected
  • Versions which Build time before December,2019
Problem Types
TypeCWE IDDescription
textN/ASession hijacking
Type: text
CWE ID: N/A
Description: Session hijacking
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dahuasecurity.com/support/cybersecurity/details/777
x_refsource_MISC
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/777
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dahuasecurity.com/support/cybersecurity/details/777
x_refsource_MISC
x_transferred
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/777
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cybersecurity@dahuatech.com
Published At:13 May, 2020 | 16:15
Updated At:18 May, 2020 | 19:42

Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Dahua Technology Co., Ltd
dahuasecurity
>>sd6al_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd6al>>-
cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd5a_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd5a>>-
cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd1a_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd1a>>-
cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ptz1a_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ptz1a>>-
cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd50_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd50>>-
cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd52c_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>sd52c>>-
cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx5842h_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx5842h>>-
cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx7842h_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx7842h>>-
cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx2xxx_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx2xxx>>-
cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hxxx5x4x_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hxxx5x4x>>-
cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b1p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b1p>>-
cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b2p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b2p>>-
cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b3p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n42b3p>>-
cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52a4p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52a4p>>-
cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n54a4p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n54a4p>>-
cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b2p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b2p>>-
cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b5p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b5p>>-
cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b3p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n52b3p>>-
cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n54b2p_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>n54b2p>>-
cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hdbw1320e-w_firmware>>Versions before 2019-12(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hdbw1320e-w>>-
cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-330Primarynvd@nist.gov
CWE ID: CWE-330
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.dahuasecurity.com/support/cybersecurity/details/777cybersecurity@dahuatech.com
Vendor Advisory
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/777
Source: cybersecurity@dahuatech.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

61Records found

CVE-2024-39950
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-8.6||HIGH
EPSS-0.26% / 48.95%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 03:45
Updated-30 Sep, 2025 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities to initiate device initialization.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-nvr4432-16p-4ks2\/i_firmwarenvr4208-8p-4ks3nvr4208-8p-4ks2\/l_firmwarenvr4232-4ks2\/l_firmwarenvr4108-4ks3nvr4108-4ks2\/lnvr4204-p-4ks2\/l_firmwarenvr4108hs-4ks3_firmwarenvr4232-4ks3nvr4232-16p-4ks3_firmwarenvr4232-16p-4ks3nvr4104-4ks3_firmwarenvr4816-16p-4ks2\/i_firmwarenvr4108-4ks2\/l_firmwarenvr4108-8p-4ks2\/l_firmwarenvr4104hs-p-4ks3nvr4216-4ks2\/lnvr4116hs-8p-4ks3_firmwarenvr4416-4ks2\/invr4816-16p-4ks2\/invr4104hs-4ks2\/l_firmwarenvr4108-8p-4ks3_firmwarenvr4204-p-4ks2\/lnvr4104hs-p-4ks3\(960g\)nvr4416-4ks2\/i_firmwarenvr4104-4ks3nvr4832-4ks2\/i_firmwarenvr4104-p-4ks3nvr4232-16p-4ks2\/lnvr4108-p-4ks3ipc-hfs8449g-z7-lednvr4108-4ks3_firmwarenvr4108hs-4ks2\/lnvr4204-4ks3_firmwarenvr4204-4ks2\/lnvr4108hs-4ks2\/l_firmwarenvr4232-16p-4ks2\/l_firmwarenvr4108hs-8p-4ks3_firmwarenvr4832-16p-4ks2\/i_firmwarenvr4216-16p-4ks3_firmwarenvr4116hs-8p-4ks2\/lnvr4108hs-p-4ks2\/lnvr4104-p-4ks2\/lnvr4104hs-p-4ks3_firmwarenvr4104-p-4ks3_firmwarenvr4432-4ks2\/invr4208-4ks3nvr4208-4ks2\/l_firmwarenvr4208-8p-4ks3_firmwarenvr4104-4ks2\/l_firmwarenvr4204-p-4ks3_firmwarenvr4204-p-4ks3nvr4108hs-8p-4ks2\/lnvr4116-4ks3nvr4104hs-4ks2\/lnvr4108hs-4ks3\(960g\)nvr4104-p-4ks3\(960g\)nvr4216-4ks3nvr4104hs-4ks3\(960g\)_firmwarenvr4432-16p-4ks2\/invr4216-4ks3_firmwarenvr4232-4ks2\/lnvr4816-4ks2\/i_firmwarenvr4108hs-p-4ks3nvr4208-4ks2\/lnvr4116hs-4ks3ipc-hfs8849g-z3-led_firmwarenvr4816-4ks2\/invr4108-8p-4ks3nvr4108-p-4ks2\/l_firmwarenvr4216-16p-4ks2\/lnvr4416-16p-4ks2\/i_firmwarenvr4108hs-4ks3nvr4116-4ks2\/l_firmwarenvr4204-4ks2\/l_firmwarenvr4104hs-4ks3nvr4116hs-8p-4ks3nvr4104hs-p-4ks3\(960g\)_firmwarenvr4108hs-4ks3\(960g\)_firmwarenvr4108-p-4ks2\/lnvr4104-4ks2\/lnvr4116-8p-4ks3_firmwarenvr4208-8p-4ks2\/lnvr4116hs-4ks2\/lnvr4216-16p-4ks3nvr4116-8p-4ks3nvr4432-4ks2\/i_firmwarenvr4208-4ks3_firmwarenvr4832-16p-4ks2\/invr4108hs-8p-4ks3nvr4108hs-p-4ks2\/l_firmwarenvr4104-p-4ks3\(960g\)_firmwarenvr4104hs-4ks3\(960g\)nvr4104hs-p-4ks2\/lipc-hfs8449g-z7-led_firmwarenvr4216-4ks2\/l_firmwarenvr4116-4ks2\/lnvr4116-8p-4ks2\/lnvr4108-8p-4ks2\/lnvr4116hs-8p-4ks2\/l_firmwarenvr4216-16p-4ks2\/l_firmwarenvr4232-4ks3_firmwarenvr4116hs-4ks3_firmwarenvr4104-p-4ks2\/l_firmwareipc-hfs8849g-z3-lednvr4108hs-8p-4ks2\/l_firmwarenvr4116-4ks3_firmwarenvr4116hs-4ks2\/l_firmwarenvr4108hs-p-4ks3_firmwarenvr4832-4ks2\/invr4116-8p-4ks2\/l_firmwarenvr4104hs-p-4ks2\/l_firmwarenvr4416-16p-4ks2\/invr4104hs-4ks3_firmwarenvr4204-4ks3nvr4108-p-4ks3_firmwareNVR4XXX and IPC-HX8XXXipc-hfw8xxxnvr4832-iipc-hf8xxx_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-20
Improper Input Validation
CVE-2019-9677
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.86% / 75.12%
||
7 Day CHG~0.00%
Published-18 Sep, 2019 | 18:46
Updated-04 Aug, 2024 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-ipc-hdw1x2x_firmwareipc-hdw5x2x_firmwareipc-hfw4x2x_firmwareipc-hfw1x2x_firmwareipc-hfw2x2x_firmwareipc-hfw2x2xipc-hdbw4x2xipc-hfw4x2xipc-hdw4x2xipc-hfw5x2x_firmwareipc-hfw1x2xipc-hdw5x2xipc-hdw2x2x_firmwareipc-hdbw4x2x_firmwareipc-hdw2x2xipc-hdw4x2x_firmwareipc-hdw1x2xipc-hfw5x2xIPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2017-7927
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.3||HIGH
EPSS-1.74% / 82.59%
||
7 Day CHG~0.00%
Published-06 May, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dhi-hcvr51a04he-s3_firmwaredh-ipc-hdw2xxxdh-ipc-hdw1xxxdh-hcvr5xxx_firmwaredh-ipc-hfw4xxxddh-hcvr4xxxdh-hcvr4xxx_firmwaredh-sd6cxx_firmwaredh-nvr1xxx_firmwaredh-ipc-hdbw13a0sndhi-hcvr51a08he-s3_firmwaredhi-hcvr51a08he-s3dh-ipc-hdbw23a0rn-zsdh-ipc-hfw1xxx_firmwaredhi-hcvr51a04he-s3dh-hcvr5xxxdh-sd6cxxdh-ipc-hdw4xxx_firmwaredh-ipc-hfw2xxxdh-ipc-hdw1xxx_firmwaredh-ipc-hdw4xxxdh-nvr1xxxdh-ipc-hdbw23a0rn-zs_firmwaredh-ipc-hfw4xxx_firmwaredh-ipc-hdbw13a0sn_firmwaredh-ipc-hfw1xxxdhi-hcvr58a32s-s2dh-ipc-hfw2xxx_firmwaredhi-hcvr58a32s-s2_firmwaredh-ipc-hdw2xxx_firmwareDahua Technology Co., Ltd Digital Video Recorders and IP Cameras
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-836
Use of Password Hash Instead of Password for Authentication
CVE-2021-33044
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-94.25% / 99.93%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 21:36
Updated-13 Jan, 2026 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-09-11||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-vth-542xh_firmwareipc-hx5xxx_firmwaresd1a1tpc-bf5x01tpc-bf5x21_firmwareipc-hum7xxx_firmwaretpc-bf2221sd52csd52c_firmwaretpc-bf2221_firmwaretpc-pt8x21btpc-sd2221vto-65xxx_firmwareipc-hx3xxx_firmwaresd1a1_firmwaresd50ipc-hx3xxxipc-hx5xxxtpc-bf1241_firmwaretpc-sd8x21vto-65xxxsd22vto-75x95xipc-hum7xxxtpc-bf1241sd22_firmwaretpc-sd2221_firmwarevth-542xhtpc-pt8x21b_firmwaretpc-bf5x01_firmwaresd49tpc-sd8x21_firmwaresd6altpc-bf5x21sd50_firmwaresd49_firmwarevto-75x95x_firmwaresd6al_firmwareSome Dahua IP Camera, Video Intercom, PTZ Dome Camera, Thermal Camera devicesIP Camera Firmware
CWE ID-CWE-287
Improper Authentication
CVE-2021-33046
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 66.11%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 20:27
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-hcvr8xxxsd50_firmwaretpc-sd2221tpc-pt8x21xipc-hx2xxx_firmwarevtox20xf_firmwareipc-hx1xxxnvr5xxxtpc-bf2221_firmwarenvr1xxx_firmwaresd6alsd1a1hcvr8xxx_firmwareipc-hx5\(4\)\(3\)xxxvtox20xfsd52c_firmwaresd22_firmwaretpc-pt8x21x_firmwaresd6al_firmwarehcvr7xxxnvr4xxx_firmwareasc2204cnvr4xxxxvr7xxxsd52cipc-hx5xxx_firmwaresd49_firmwaretpc-sd8x21_firmwaresd1a1_firmwareipc-hx3xxx_firmwaretpc-bf5x01_firmwaretpc-bf1241tpc-sd8x21tpc-sd2221_firmwarenvr2xxx_firmwarenvr1xxxxvr4xxx_firmwaretpc-bf5x01hcvr7xxx_firmwarexvr5xxxsd49nvr2xxxipc-hx3xxxxvr5xxx_firmwaresd22tpc-bf2221ipc-hx5xxxtpc-bf1241_firmwarexvr4xxxxvr7xxx_firmwareipc-hx5\(4\)\(3\)xxx_firmwarenvr5xxx_firmwaresd50ipc-hx2xxxasc2204c_firmwareipc-hx1xxx_firmwareAccess control vulnerability found in some Dahua products
CWE ID-CWE-287
Improper Authentication
CVE-2013-6117
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-89.73% / 99.57%
||
7 Day CHG~0.00%
Published-11 Jul, 2014 | 19:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-3836
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-91.45% / 99.67%
||
7 Day CHG~0.00%
Published-22 Jul, 2023 | 18:00
Updated-02 Aug, 2024 | 07:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dahua Smart Park Management unrestricted upload

A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-smart_parking_managementSmart Park Management
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2017-3223
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-10.78% / 93.38%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-ip_camera_firmwareip_cameraIP Camera
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-33045
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-94.17% / 99.92%
||
7 Day CHG+0.03%
Published-15 Sep, 2021 | 21:50
Updated-13 Jan, 2026 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-09-11||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-vth-542xh_firmwareipc-hx5xxx_firmwarenvr-6xxxvr-5x16ipc-hum7xxx_firmwarexvr-7x16_firmwarenvr-4xxxxvr-4x04vto-65xxx_firmwarexvr-4x04_firmwareipc-hx3xxx_firmwarenvr-1xxxipc-hx3xxxipc-hx5xxxnvr-2xxx_firmwarevto-65xxxnvr-4xxx_firmwareipc-hum7xxxvto-75x95xxvr-4x08_firmwarenvr-5xxx_firmwarexvr-7x32xvr-5x08_firmwarevth-542xhxvr-4x08xvr-7x16xvr-7x32_firmwarenvr-1xxx_firmwarenvr-5xxxxvr-5x04_firmwarenvr-2xxxxvr-5x08xvr-5x16_firmwarexvr-5x04vto-75x95x_firmwarenvr-6xx_firmwareSome Dahua IP Camera, Video Intercom, NVR, XVR devicesIP Camera Firmware
CWE ID-CWE-287
Improper Authentication
CVE-2022-46353
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-1.99% / 83.70%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.

Action-Not Available
Vendor-Siemens AG
Product-6gk5204-0bs00-3pa36gk5204-0ba00-2mb2_firmware6gk5204-0ba00-2kb2_firmware6gk5204-0ba00-2mb26gk5204-0ba00-2kb26gk5204-0bs00-3la3_firmware6gk5204-0bs00-2na3_firmware6gk5204-0bs00-3pa3_firmware6gk5204-0bs00-2na36gk5204-0bs00-3la3SCALANCE X204RNA (HSR)SCALANCE X204RNA EEC (PRP/HSR)SCALANCE X204RNA EEC (PRP)SCALANCE X204RNA EEC (HSR)SCALANCE X204RNA (PRP)
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2008-2433
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-9.8||CRITICAL
EPSS-12.31% / 93.91%
||
7 Day CHG~0.00%
Published-27 Aug, 2008 | 20:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."

Action-Not Available
Vendor-n/aTrend Micro Incorporated
Product-officescanclient_server_messaging_suiteworry-free_business_securityn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2008-0141
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.88% / 90.62%
||
7 Day CHG~0.00%
Published-08 Jan, 2008 | 19:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

actions.php in WebPortal CMS 0.6-beta generates predictable passwords containing only the time of day, which makes it easier for remote attackers to obtain access to any account via a lostpass action.

Action-Not Available
Vendor-webportal_cms_projectn/a
Product-webportal_cmsn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-44938
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.39%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.

Action-Not Available
Vendor-seeddmsn/a
Product-seeddmsn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-39216
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.49% / 65.64%
||
7 Day CHG~0.00%
Published-14 Mar, 2023 | 15:10
Updated-25 Feb, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Combodo iTop's weak password reset token leads to account takeover

Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, the reset password token is generated without any randomness parameter. This may lead to account takeover. The issue is fixed in versions 2.7.8 and 3.0.2-1.

Action-Not Available
Vendor-combodoCombodo
Product-itopiTop
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-36045
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9||CRITICAL
EPSS-0.71% / 72.34%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:10
Updated-23 Apr, 2025 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Account takeover via cryptographically weak PRNG in NodeBB Forum

NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. It utilizes web sockets for instant interactions and real-time notifications. `utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the password reset functionality could enable an attacker to correctly calculate the reset code for an account they do not have access to. This vulnerability impacts all installations of NodeBB. The vulnerability allows for an attacker to take over any account without the involvement of the victim, and as such, the remediation should be applied immediately (either via NodeBB upgrade or cherry-pick of the specific changeset. The vulnerability has been patched in version 2.x and 1.19.x. There is no known workaround, but the patch sets listed above will fully patch the vulnerability.

Action-Not Available
Vendor-nodebbNodeBB
Product-nodebbNodeBB
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2026-27755
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 35.44%
||
7 Day CHG+0.01%
Published-27 Feb, 2026 | 18:09
Updated-03 Mar, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SODOLA SL902-SWTGW124AS <= 200.1.20 Predictable Session ID

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability that allows attackers to forge authenticated sessions by computing predictable MD5-based cookies. Attackers who know or guess valid credentials can calculate the session identifier offline and bypass authentication without completing the login flow, gaining unauthorized access to the device.

Action-Not Available
Vendor-sodola-networkShenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product-sl902-swtgw124assl902-swtgw124as_firmwareSODOLA SL902-SWTGW124AS
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-26647
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-1.48% / 81.10%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 10:06
Updated-21 Apr, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.

Action-Not Available
Vendor-Siemens AG
Product-scalance_xf206-1_firmwarescalance_xf201-3p_irtscalance_x208_pro_firmwarescalance_x201-3p_irtscalance_x212-2ldscalance_x204-2ldscalance_xf208scalance_x201-3p_irt_firmwarescalance_x202-2p_irt_pro_firmwarescalance_xf204irtscalance_xf204-2ba_irt_firmwarescalance_x206-1scalance_x204-2ld_ts_firmwarescalance_x204irtscalance_x201-3p_irt_proscalance_x204-2fmscalance_x204-2ld_tsscalance_x208scalance_x200-4p_irtscalance_x204irt_pro_firmwarescalance_x202-2irtscalance_x202-2p_irtscalance_x204-2scalance_x224scalance_x206-1_firmwarescalance_x204-2_firmwarescalance_xf204-2scalance_xf206-1scalance_x202-2p_irt_firmwarescalance_x206-1ld_firmwarescalance_x212-2ld_firmwarescalance_x212-2scalance_xf204_firmwarescalance_x204-2ts_firmwarescalance_xf204-2ba_irtscalance_x216_firmwarescalance_x204-2ld_firmwarescalance_x212-2_firmwarescalance_xf202-2p_irt_firmwarescalance_xf208_firmwarescalance_x208_firmwarescalance_x208_proscalance_x202-2p_irt_proscalance_xf204-2_firmwarescalance_x202-2irt_firmwarescalance_xf202-2p_irtscalance_x200-4p_irt_firmwarescalance_x204irt_proscalance_x216scalance_xf201-3p_irt_firmwarescalance_x204-2fm_firmwarescalance_x204-2tsscalance_xf204irt_firmwarescalance_x201-3p_irt_pro_firmwarescalance_x204irt_firmwarescalance_xf204scalance_x206-1ldscalance_x224_firmwareSCALANCE XF201-3P IRTSCALANCE XF204-2BA IRTSCALANCE X202-2P IRTSCALANCE X202-2P IRT PROSCALANCE X204-2TSSCALANCE X206-1SCALANCE XF204IRTSCALANCE X204IRTSCALANCE X200-4P IRTSCALANCE X224SCALANCE XF208SCALANCE X208SCALANCE XF204-2SCALANCE X204-2LD TSSCALANCE X208PROSCALANCE X204-2LDSCALANCE X204-2SCALANCE X216SCALANCE X212-2LDSCALANCE X201-3P IRT PROSCALANCE XF206-1SCALANCE X201-3P IRTSCALANCE X206-1LDSCALANCE X212-2SCALANCE XF202-2P IRTSCALANCE X204-2FMSCALANCE XF204SCALANCE X202-2IRTSCALANCE X204IRT PRO
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2026-27637
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.29% / 52.57%
||
7 Day CHG+0.02%
Published-25 Feb, 2026 | 03:41
Updated-26 Feb, 2026 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeScout's Predictable Authentication Token Enables Account Takeover

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's `TokenAuth` middleware uses a predictable authentication token computed as `MD5(user_id + created_at + APP_KEY)`. This token is static (never expires/rotates), and if an attacker obtains the `APP_KEY` — a well-documented and common exposure vector in Laravel applications — they can compute a valid token for any user, including the administrator, achieving full account takeover without any password. This vulnerability can be exploited on its own or in combination with CVE-2026-27636. Version 1.8.206 fixes both vulnerabilities.

Action-Not Available
Vendor-freescoutfreescout-help-desk
Product-freescoutfreescout
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-22922
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 66.37%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 00:55
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wa850retl-wa850re_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-4248
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.6||MEDIUM
EPSS-0.60% / 69.53%
||
7 Day CHG~0.00%
Published-18 Dec, 2022 | 00:00
Updated-15 Apr, 2025 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
kapetan dns Request.cs entropy

A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.

Action-Not Available
Vendor-kapetan_dns_projectkapetan
Product-kapetan_dnsdns
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-35163
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.73% / 72.80%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 19:25
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain a Use of Insufficiently Random Values Vulnerability.

Action-Not Available
Vendor-Oracle CorporationDell Inc.
Product-http_serverweblogic_server_proxy_plug-inbsafe_crypto-c-micro-editiondatabasebsafe_micro-edition-suitesecurity_serviceDell BSAFE Crypto-C Micro Edition
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-35926
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.84%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 08:16
Updated-04 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the nanorand crate before 0.5.1 for Rust. It caused any random number generator (even ChaCha) to return all zeroes because integer truncation was mishandled.

Action-Not Available
Vendor-nanorand_projectn/a
Product-nanorandn/a
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-27743
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.57% / 68.58%
||
7 Day CHG~0.00%
Published-26 Oct, 2020 | 21:40
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

Action-Not Available
Vendor-pam_tacplus_projectn/a
Product-pam_tacplusn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2026-25072
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.6||HIGH
EPSS-0.19% / 40.89%
||
7 Day CHG~0.00%
Published-07 Mar, 2026 | 00:20
Updated-12 Mar, 2026 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XikeStor SKS8310-8X Predictable Session Identifiers

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a predictable session identifier vulnerability in the /goform/SetLogin endpoint that allows remote attackers to hijack authenticated sessions. Attackers can predict session identifiers using insufficiently random cookie values and exploit exposed session parameters in URLs to gain unauthorized access to authenticated user sessions.

Action-Not Available
Vendor-seekswanAnhui Seeker Electronic Technology Co., LTD.
Product-zikestor_sks8310-8xzikestor_sks8310-8x_firmwareXikeStor SKS8310-8X
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-2099
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.6||HIGH
EPSS-0.64% / 70.72%
||
7 Day CHG~0.00%
Published-29 Jan, 2020 | 15:15
Updated-04 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

Action-Not Available
Vendor-Jenkins
Product-jenkinsJenkins
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-1731
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.39% / 59.96%
||
7 Day CHG~0.00%
Published-02 Mar, 2020 | 16:22
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.

Action-Not Available
Vendor-Red Hat, Inc.
Product-keycloak_operatorkeycloak
CWE ID-CWE-341
Predictable from Observable State
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-4344
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 24.34%
||
7 Day CHG~0.00%
Published-15 Aug, 2023 | 18:25
Updated-04 Nov, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection

Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection

Action-Not Available
Vendor-Intel CorporationBroadcom Inc.
Product-raid_controller_web_interfaceLSI Storage Authority (LSA)RAID Web Console 3 (RWC3)
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-331
Insufficient Entropy
CVE-2023-39979
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.17%
||
7 Day CHG~0.00%
Published-02 Sep, 2023 | 12:05
Updated-30 Sep, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MXsecurity Authentication Bypass

There is a vulnerability in MXsecurity versions prior to 1.0.1 that can be exploited to bypass authentication. A remote attacker might access the system if the web service authenticator has insufficient random values.  

Action-Not Available
Vendor-Moxa Inc.
Product-mxsecurityMXsecurity Series
CWE ID-CWE-334
Small Space of Random Values
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-9898
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.29% / 88.91%
||
7 Day CHG~0.00%
Published-21 Mar, 2019 | 02:31
Updated-04 Aug, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential recycling of random numbers used in cryptography exists within PuTTY before 0.71.

Action-Not Available
Vendor-puttyn/aNetApp, Inc.Debian GNU/LinuxFedora ProjectopenSUSE
Product-debian_linuxfedoraoncommand_unified_managerputtyleapn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2009-2158
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.02% / 88.51%
||
7 Day CHG~0.00%
Published-22 Jun, 2009 | 19:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

account-recover.php in TorrentTrader Classic 1.09 chooses random passwords from an insufficiently large set, which makes it easier for remote attackers to obtain a password via a brute-force attack.

Action-Not Available
Vendor-torrenttrader_projectn/a
Product-torrenttradern/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2024-36389
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.93%
||
7 Day CHG~0.00%
Published-02 Jun, 2024 | 13:21
Updated-10 Apr, 2025 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MileSight DeviceHub - CWE-330 Use of Insufficiently Random Values

MileSight DeviceHub - CWE-330 Use of Insufficiently Random Values may allow Authentication Bypass

Action-Not Available
Vendor-Canonical Ltd.Milesight
Product-ubuntu_linuxdevicehubDeviceHubdevicehub
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-7667
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.65% / 87.91%
||
7 Day CHG~0.00%
Published-01 Jul, 2019 | 18:22
Updated-04 Aug, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system.

Action-Not Available
Vendor-primasystemsn/a
Product-flexairn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2025-64097
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.5||CRITICAL
EPSS-0.02% / 5.28%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 14:57
Updated-17 Feb, 2026 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NervesHub has Insufficient Token Entropy that Allows Authentication Bypass via Brute Force

NervesHub is a web service that allows users to manage over-the-air (OTA) firmware updates of devices in the field. A vulnerability present starting in version 1.0.0 and prior to version 2.3.0 allowed attackers to brute-force user API tokens due to the predictable format of previously issued tokens. Tokens included user-identifiable components and were not cryptographically secure, making them susceptible to guessing or enumeration. The vulnerability could have allowed unauthorized access to user accounts or API actions protected by these tokens. A fix is available in version 2.3.0 of NervesHub. This version introduces strong, cryptographically-random tokens using `:crypto.strong_rand_bytes/1`, hashing of tokens before database storage to prevent misuse even if the database is compromised, and context-aware token storage to distinguish between session and API tokens. There are no practical workarounds for this issue other than upgrading. In sensitive environments, as a temporary mitigation, firewalling access to the NervesHub server can help limit exposure until an upgrade is possible.

Action-Not Available
Vendor-nerves-hubnerves-hub
Product-nerveshubnerves_hub_web
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-29332
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-14.61% / 94.50%
||
7 Day CHG~0.00%
Published-12 Sep, 2023 | 16:58
Updated-30 Oct, 2025 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability

Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_kubernetes_serviceAzure Kubernetes Service
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-20
Improper Input Validation
CVE-2019-2294
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.89%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:40
Updated-04 Aug, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Usage of hard-coded magic number for calculating heap guard bytes can allow users to corrupt heap blocks without heap algorithm knowledge in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850sd_632mdm9635m_firmwaresd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdm439sd_636snapdragon_high_med_2016_firmwaremsm8909w_firmwaremsm8996ausd_820sd_650sd_450_firmwaresd_845_firmwaresd_410sd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206sd_652sd_425_firmwaresd_665sd_625_firmwaresd_450mdm9635msd_8cx_firmwaremdm9615mdm9205mdm9206_firmwaresd_845qcs605sd_632_firmwaresd_835_firmwaresd_835sda660sxr1130_firmwaresd_210_firmwaresd_652_firmwaresxr1130msm8909wsd_665_firmwaresd_205_firmwaresd_212sd_650_firmwaresd_427_firmwaresd_712sd_855sd_730_firmwaresd_412qualcomm_215sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_710_firmwaresdm630sd_625sd_820_firmwaresd_210mdm9607sd_636_firmwaremdm9625_firmwaresd_439_firmwarequalcomm_215_firmwaresd_429_firmwaresd_730snapdragon_high_med_2016sd_212_firmwaresd_850_firmwaremdm9655sdm439_firmwaresd_412_firmwaresd_712_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwaremdm9625sd_8cxsd_430sd_427sd_670sd_435_firmwaremdm9615_firmwaresd_710sd_410_firmwaresd_205sdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-2317
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.69%
||
7 Day CHG~0.00%
Published-05 Mar, 2020 | 08:56
Updated-04 Aug, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The secret key used to make the Initial Sequence Number in the TCP SYN packet could be brute forced and therefore can be predicted in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, SC8180X, SDM429, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8920qcm2150_firmwaremsm8953sdm450sdm632_firmwaresdm450_firmwaresdm632qcm2150msm8920_firmwaresdm439sdx24sc8180x_firmwaresdm429msm8940_firmwaresm7150_firmwaresm6150qm215sm7150msm8917msm8937sc8180xmsm8905sm8150_firmwaremsm8909sdx24_firmwaresdm439_firmwareqm215_firmwaresdx55msm8940msm8953_firmwaresm6150_firmwaremsm8917_firmwaremsm8937_firmwaresdm429_firmwaresm8150msm8905_firmwaresdx55_firmwarenicobar_firmwaremsm8909_firmwarenicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-36294
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 62.18%
||
7 Day CHG~0.00%
Published-25 Jan, 2022 | 22:15
Updated-16 Sep, 2024 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability by forging a cookie to login as any user.

Action-Not Available
Vendor-Dell Inc.
Product-vnx5600vnx5400vnx5800vnx_vg10emc_unity_operating_environmentvnx5200vnx_vg50vnx7600vnx8000VNX Control Station
CWE ID-CWE-331
Insufficient Entropy
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-2884
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 32.08%
||
7 Day CHG~0.00%
Published-25 May, 2023 | 08:26
Updated-15 Jan, 2025 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Randomness in CBOT's Chatbot

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.

Action-Not Available
Vendor-CBOT
Product-cbot_panelcbot_coreChatbot
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2024-25943
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.6||HIGH
EPSS-2.40% / 85.12%
||
7 Day CHG~0.00%
Published-29 Jun, 2024 | 12:52
Updated-03 Feb, 2025 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. A remote attacker could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application.

Action-Not Available
Vendor-Dell Inc.
Product-idrac9Integrated Dell Remote Access Controller 9integrated_dell_remote_access_controller_9_firmware
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-27631
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.67%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random.

Action-Not Available
Vendor-oryx-embeddedn/a
Product-cyclonetcpn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-38606
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.84%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 15:57
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

reNgine through 0.5 relies on a predictable directory name.

Action-Not Available
Vendor-n/aYogesh Ojha
Product-renginen/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-36166
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.50% / 66.18%
||
7 Day CHG~0.00%
Published-01 Mar, 2022 | 18:10
Updated-25 Oct, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability in FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortimailFortinet FortiMail
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-16674
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 67.96%
||
7 Day CHG~0.00%
Published-06 Dec, 2019 | 17:09
Updated-05 Aug, 2024 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network.

Action-Not Available
Vendor-weidmuellern/a
Product-ie-sw-pl18mt-2gc14tx2stie-sw-pl18mt-2gc14tx2st_firmwareie-sw-pl16mt-16tx_firmwareie-sw-pl10m-1gt-2gs-7tx_firmwareie-sw-pl08m-8txie-sw-vl05mt-3tx-2scie-sw-vl05mt-3tx-2sc_firmwareie-sw-pl18m-2gc14tx2scie-sw-vl05mt-5txie-sw-pl08m-6tx-2st_firmwareie-sw-vl08mt-6tx-2stie-sw-pl18m-2gc14tx2scsie-sw-pl08mt-8txie-sw-pl18mt-2gc14tx2scsie-sw-pl16mt-14tx-2stie-sw-vl05m-5txie-sw-pl16mt-16txie-sw-pl16mt-14tx-2sc_firmwareie-sw-pl18m-2gc14tx2scs_firmwareie-sw-pl08mt-6tx-2st_firmwareie-sw-pl16m-16tx_firmwareie-sw-vl08mt-6tx-2scsie-sw-pl10m-3gt-7tx_firmwareie-sw-vl05m-3tx-2sc_firmwareie-sw-pl08m-6tx-2sc_firmwareie-sw-pl08m-6tx-2stie-sw-pl08m-8tx_firmwareie-sw-pl08m-6tx-2scs_firmwareie-sw-pl09m-5gc-4gtie-sw-pl18m-2gc-16tx_firmwareie-sw-vl08mt-6tx-2sc_firmwareie-sw-pl09mt-5gc-4gtie-sw-vl05m-3tx-2st_firmwareie-sw-vl08mt-6tx-2scie-sw-pl18mt-2gc-16tx_firmwareie-sw-pl10m-3gt-7txie-sw-pl16m-16txie-sw-pl10mt-3gt-7txie-sw-pl08mt-6tx-2sc_firmwareie-sw-pl08mt-6tx-2scie-sw-pl18mt-2gc14tx2scs_firmwareie-sw-pl08mt-8tx_firmwareie-sw-pl18mt-2gc-16txie-sw-pl16m-14tx-2stie-sw-pl18m-2gc14tx2stie-sw-vl05mt-3tx-2st_firmwareie-sw-pl16m-14tx-2scie-sw-pl18m-2gc-16txie-sw-vl08mt-5tx-1sc-2scsie-sw-pl16mt-14tx-2st_firmwareie-sw-pl18m-2gc14tx2sc_firmwareie-sw-pl10mt-1gt-2gs-7tx_firmwareie-sw-pl08m-6tx-2scie-sw-pl08m-6tx-2scsie-sw-pl09m-5gc-4gt_firmwareie-sw-vl08mt-6tx-2st_firmwareie-sw-pl08mt-6tx-2stie-sw-pl16mt-14tx-2scie-sw-pl18m-2gc14tx2st_firmwareie-sw-vl08mt-5tx-3sc_firmwareie-sw-pl10mt-3gt-7tx_firmwareie-sw-pl18mt-2gc14tx2sc_firmwareie-sw-pl09mt-5gc-4gt_firmwareie-sw-pl16m-14tx-2sc_firmwareie-sw-vl05mt-5tx_firmwareie-sw-pl10m-1gt-2gs-7txie-sw-vl08mt-6tx-2scs_firmwareie-sw-pl10mt-1gt-2gs-7txie-sw-vl05m-3tx-2scie-sw-vl08mt-8tx_firmwareie-sw-pl18mt-2gc14tx2scie-sw-vl08mt-8txie-sw-pl08mt-6tx-2scsie-sw-pl16m-14tx-2st_firmwareie-sw-vl05mt-3tx-2stie-sw-vl08mt-5tx-3scie-sw-vl08mt-5tx-1sc-2scs_firmwareie-sw-vl05m-3tx-2stie-sw-pl08mt-6tx-2scs_firmwareie-sw-vl05m-5tx_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-34646
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-22.51% / 95.87%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 18:03
Updated-05 May, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Booster for WooCommerce <= 5.4.3 Authentication Bypass

Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.

Action-Not Available
Vendor-boosterPluggabl LLC
Product-booster_for_woocommerceBooster for WooCommcerce
CWE ID-CWE-290
Authentication Bypass by Spoofing
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2008-3612
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.52% / 85.50%
||
7 Day CHG~0.00%
Published-10 Sep, 2008 | 16:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2025-4607
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-1.06% / 77.77%
||
7 Day CHG~0.00%
Published-31 May, 2025 | 06:40
Updated-08 Apr, 2026 | 17:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PSW Front-end Login & Registration <= 1.12 - Insufficiently Random Values to Unauthenticated Account Takeover/Privilege Escalation via customer_registration Function

The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover.

Action-Not Available
Vendor-empoweringprowebsite
Product-PSW Front-end Login & Registration
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-28024
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.84%
||
7 Day CHG+0.01%
Published-08 Nov, 2021 | 14:29
Updated-03 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthorized system access in the login form in ServiceTonic Helpdesk software version < 9.0.35937 allows attacker to login without using a password.

Action-Not Available
Vendor-servicetonicn/a
Product-servicetonicn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-27200
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.04% / 86.75%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 17:40
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In WoWonder 3.0.4, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day.

Action-Not Available
Vendor-wowondern/a
Product-wowondern/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-23451
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 59.35%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 14:11
Updated-17 Sep, 2024 | 03:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Randomness

The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack.

Action-Not Available
Vendor-otp-generator_projectn/a
Product-otp-generatorotp-generator
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-46740
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.65%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 16:20
Updated-17 Jun, 2025 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure random string generator used for sensitive data

CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the “accessKey”. To create the "accesKey", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.

Action-Not Available
Vendor-cubefsThe Linux Foundation
Product-cubefscubefs
CWE ID-CWE-330
Use of Insufficiently Random Values
  • Previous
  • 1
  • 2
  • Next
Details not found