Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-40496

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-21 Apr, 2026 | 01:38
Updated At-21 Apr, 2026 | 13:50
Rejected At-
Credits

FreeScout has Predictable Attachment Token that Allows Unauthenticated Private File Download via Brute Force

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, attachment download tokens are generated using a weak and predictable formula: `md5(APP_KEY + attachment_id + size)`. Since attachment_id is sequential and size can be brute-forced in a small range, an unauthenticated attacker can forge valid tokens and download any private attachment without credentials. Version 1.8.213 fixes the issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:21 Apr, 2026 | 01:38
Updated At:21 Apr, 2026 | 13:50
Rejected At:
▼CVE Numbering Authority (CNA)
FreeScout has Predictable Attachment Token that Allows Unauthenticated Private File Download via Brute Force

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, attachment download tokens are generated using a weak and predictable formula: `md5(APP_KEY + attachment_id + size)`. Since attachment_id is sequential and size can be brute-forced in a small range, an unauthenticated attacker can forge valid tokens and download any private attachment without credentials. Version 1.8.213 fixes the issue.

Affected Products
Vendor
freescout-help-desk
Product
freescout
Versions
Affected
  • < 1.8.213
Problem Types
TypeCWE IDDescription
CWECWE-330CWE-330: Use of Insufficiently Random Values
CWECWE-340CWE-340: Generation of Predictable Numbers or Identifiers
Type: CWE
CWE ID: CWE-330
Description: CWE-330: Use of Insufficiently Random Values
Type: CWE
CWE ID: CWE-340
Description: CWE-340: Generation of Predictable Numbers or Identifiers
Metrics
VersionBase scoreBase severityVector
4.08.8HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
Version: 4.0
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2783-wxmm-wmwr
x_refsource_CONFIRM
https://github.com/freescout-help-desk/freescout/commit/dbdf8f2260b43a21818255c70f0b61b9de9cd555
x_refsource_MISC
https://github.com/freescout-help-desk/freescout/releases/tag/1.8.213
x_refsource_MISC
Hyperlink: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2783-wxmm-wmwr
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/freescout-help-desk/freescout/commit/dbdf8f2260b43a21818255c70f0b61b9de9cd555
Resource:
x_refsource_MISC
Hyperlink: https://github.com/freescout-help-desk/freescout/releases/tag/1.8.213
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:21 Apr, 2026 | 02:16
Updated At:23 Apr, 2026 | 16:32

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, attachment download tokens are generated using a weak and predictable formula: `md5(APP_KEY + attachment_id + size)`. Since attachment_id is sequential and size can be brute-forced in a small range, an unauthenticated attacker can forge valid tokens and download any private attachment without credentials. Version 1.8.213 fixes the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.8HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

freescout
freescout
>>freescout>>Versions before 1.8.213(exclusive)
cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-330Primarysecurity-advisories@github.com
CWE-340Primarysecurity-advisories@github.com
CWE ID: CWE-330
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-340
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/freescout-help-desk/freescout/commit/dbdf8f2260b43a21818255c70f0b61b9de9cd555security-advisories@github.com
Patch
https://github.com/freescout-help-desk/freescout/releases/tag/1.8.213security-advisories@github.com
Release Notes
https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2783-wxmm-wmwrsecurity-advisories@github.com
Exploit
Vendor Advisory
Hyperlink: https://github.com/freescout-help-desk/freescout/commit/dbdf8f2260b43a21818255c70f0b61b9de9cd555
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/freescout-help-desk/freescout/releases/tag/1.8.213
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2783-wxmm-wmwr
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

21Records found

CVE-2026-27637
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.29% / 52.56%
||
7 Day CHG+0.02%
Published-25 Feb, 2026 | 03:41
Updated-26 Feb, 2026 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeScout's Predictable Authentication Token Enables Account Takeover

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's `TokenAuth` middleware uses a predictable authentication token computed as `MD5(user_id + created_at + APP_KEY)`. This token is static (never expires/rotates), and if an attacker obtains the `APP_KEY` — a well-documented and common exposure vector in Laravel applications — they can compute a valid token for any user, including the administrator, achieving full account takeover without any password. This vulnerability can be exploited on its own or in combination with CVE-2026-27636. Version 1.8.206 fixes both vulnerabilities.

Action-Not Available
Vendor-freescoutfreescout-help-desk
Product-freescoutfreescout
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-30935
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-1.51% / 81.26%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 10:24
Updated-21 May, 2025 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well.

Action-Not Available
Vendor-b2evolutionn/a
Product-b2evolutionn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2026-5081
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.1||CRITICAL
EPSS-Not Assigned
Published-06 May, 2026 | 12:16
Updated-06 May, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are insecure

Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are insecure. Apache::Session::Generate::ModUniqueId (added in version 1.54) uses the value of the UNIQUE_ID environment variable for the session id. The UNIQUE_ID variable is set by the Apache mod_unique_id plugin, which generates unique ids for the request. The id is based on the IPv4 address, the process id, the epoch time, a 16-bit counter and a thread index, with no obfuscation. The server IP is often available to the public, and if not available, can be guessed from previous session ids being issued. The process ids may also be guessed from previous session ids. The timestamp is easily guessed (and leaked in the HTTP Date response header). The purpose of mod_unique_id is to assign a unique id to requests so that events can be correlated in different logs. The id is not designed, nor is it suitable for security purposes.

Action-Not Available
Vendor-CHORNY
Product-Apache::Session::Generate::ModUniqueId
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
CVE-2020-35685
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.41% / 61.17%
||
7 Day CHG~0.00%
Published-19 Aug, 2021 | 11:21
Updated-04 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)

Action-Not Available
Vendor-hcc-embeddedn/aSiemens AG
Product-sentron_3wa_com190_firmwaresentron_3wl_com35_firmwaresentron_3wa_com190sentron_3wl_com35nichestackn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-23408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.28% / 51.51%
||
7 Day CHG~0.00%
Published-18 Jan, 2022 | 20:20
Updated-03 Aug, 2024 | 03:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wolfSSL 5.x before 5.1.1 uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS 1.1 or 1.2 or DTLS 1.1 or 1.2. This occurs because of misplaced memory initialization in BuildMessage in internal.c.

Action-Not Available
Vendor-wolfssln/a
Product-wolfssln/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-27633
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FNET 4.6.3, TCP ISNs are improperly random.

Action-Not Available
Vendor-butokn/a
Product-fnetn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2017-6026
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-18.57% / 95.29%
||
7 Day CHG~0.00%
Published-30 Jun, 2017 | 02:35
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.

Action-Not Available
Vendor-n/aSchneider Electric SE
Product-modicon_m241modicon_m251modicon_m251_firmwaremodicon_m241_firmwareSchneider Electric Modicon PLCs
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-26320
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.38% / 59.55%
||
7 Day CHG~0.00%
Published-14 Mar, 2022 | 17:28
Updated-07 Oct, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Rambus SafeZone Basic Crypto Module before 10.4.0, as used in certain Fujifilm (formerly Fuji Xerox) devices before 2022-03-01, Canon imagePROGRAF and imageRUNNER devices through 2022-03-14, and potentially many other devices, generates RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate.

Action-Not Available
Vendor-fujifilmrambusn/aCanon Inc.
Product-apeosprint_c325_dwapeos_c3070apeospro_c650docuprint_c3555_dapeosport-vii_c6688docucentre-vii_c5588_firmwareapeos_c7580_firmwaredocucentre-vii_c7773apeos_c3570_gapeosport_c6570_gapeosport_c5570_gapeos_c3570_firmwareapeos_c8180_firmwaredocuprint_3205_d_firmwaredocuprint_c2555_d_firmwareapeosport_c2060_firmwaredocucentre-vii_c5573apeosport_3560_g_firmwareapeosport_c2560_g_firmwareapeosport-vii_c7788apeos_c5570_g_firmwareapeosport_2560docuprint_3508_d_firmwareapeos_c5570_gapeosport-vii_p4021docucentre-vii_c7788docuprint_4408_dapeosport_c4570_gapeosport_c2560docuprint_c2555_dapeosport-vii_c7773_firmwareapeosport_c5570_firmwareapeosport-vii_c3372apeosport_4570_gapeosprint_c328apeosport_c5570_g_firmwareapeosport-vii_c5573_firmwareapeospro_c750docucentre-vii_c2273_firmwareapeosport_5570apeosport_c2060_gapeos_c3070_firmwareapeosport_c4570apeosport-vii_c3321apeos_c4570apeosport_5570_gapeosport_c2560_firmwareapeos_c8180apeos_c325_dwapeosport-vii_c3372_firmwareapeos_c7070_firmwaredocucentre-vii_c3372apeos_c328_dw_firmwareapeosport-vii_c6773_firmwareimageprograf_firmwareapeos_c5570apeos_c4570_g_firmwareapeos_c325_z_firmwaredocuprint_3505_d_firmwaredocuprint_3508_ddocuprint_3208_dapeosport_3060_firmwareapeos_c6570_gdocucentre-vii_c4473_firmwareapeosport_c3060docucentre-vii_c6688_firmwareapeospro_c810apeosport_3060_gapeosport_c2060apeosport_3560apeosport-vii_c2273_firmwareprimelink_c9070apeosport_c3570_firmwareapeos_c6580apeosport-vii_5021docuprint_c3555_d_firmwareapeos_c7070_g_firmwareapeosport_print_c5570_firmwareapeosport-vii_4021_firmwaresafezone_basic_crypto_moduleapeosport_c3070_firmwareprimelink_c9065apeos_c4570_gapeosport_2560_g_firmwareapeos_c3570apeosport_3560_firmwareapeosport_c6570_firmwaredocucentre-vii_c3373_firmwareapeosprint_c328_dw_firmwareapeos_c7070_gapeos_c5570_firmwareapeosport_c3070apeosport_5570_firmwareapeosport-vii_5021_firmwareprimelink_c9065_firmwareapeos_c328_df_firmwareapeosport-vii_c5588_firmwareapeosport_c3570_gdocucentre-vii_c7788_firmwareapeosport_c3070_gapeosport_3060_g_firmwareapeosport_c7070docucentre-vii_c5573_firmwaredocuprint_3205_dapeosport_c5570apeos_c3070_gapeosport_4570_g_firmwareapeosport-vii_c4421apeos_c3070_g_firmwareapeosport-vii_c6773apeos_c328_dwapeos_c4570_firmwaredocucentre-vii_c3372_firmwaredocuprint_4405_d_firmwareapeosport_c4570_g_firmwaredocuprint_3208_d_firmwareapeospro_c810_firmwareapeosport-vii_c3321_firmwareapeosport_c3070_g_firmwaredocucentre-vii_c2273docuprint_4408_d_firmwareapeosport_c6570_g_firmwareapeosport-vii_c6688_firmwareapeosport_5570_g_firmwareapeosport_print_c5570imagerunner_firmwareapeosport_c2060_g_firmwareapeos_c325_zapeosport_4570_firmwareapeosport-vii_p4021_firmwareapeosport-vii_c5573apeosport-vii_c7788_firmwareapeosport_3060apeosport_c3060_firmwareapeos_c6570_g_firmwareapeosport-vii_c4421_firmwaredocucentre-vii_c7773_firmwareapeosport-vii_c3373_firmwareapeosport-vii_cp4421_firmwareapeosport_c7070_gapeos_c6580_firmwareapeosport_c3570apeosport-vii_c4473_firmwareapeosprint_c328_firmwareapeosport-vii_cp4421apeosprint_c325_dw_firmwareapeosport_2560_firmwaredocuprint_3505_ddocucentre-vii_c3373apeos_c6570_firmwareapeos_c325_dw_firmwareprimelink_c9070_firmwaredocucentre-vii_c6673_firmwareapeos_c7070apeospro_c750_firmwareapeosport-vii_4021apeosport-vii_c3373apeosport-vii_c2273apeos_c7580docuprint_4405_dapeosport_4570apeos_c6570apeos_c3570_g_firmwareapeosport_c7070_g_firmwareapeosport-vii_c4473apeosport_c6570docucentre-vii_c6673apeosprint_c328_dwapeosport_c3570_g_firmwaredocucentre-vii_c6688docucentre-vii_c5588apeosport_c2560_gapeosport_2560_gapeosport_3560_gapeos_c328_dfapeosport_c4570_firmwareapeospro_c650_firmwareapeosport-vii_c7773apeosport_c7070_firmwaredocucentre-vii_c4473apeosport-vii_c5588n/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-21352
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.36% / 57.83%
||
7 Day CHG~0.00%
Published-03 Mar, 2021 | 00:20
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Predictable tokens used for password resets

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).

Action-Not Available
Vendor-anukoanuko
Product-time_trackertimetracker
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2026-5085
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.1||CRITICAL
EPSS-0.04% / 12.35%
||
7 Day CHG~0.00%
Published-13 Apr, 2026 | 06:56
Updated-23 Apr, 2026 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Solstice::Session versions through 1440 for Perl generates session ids insecurely

Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers. Predictable session ids could allow an attacker to gain access to systems.

Action-Not Available
Vendor-mcrawforMCRAWFOR
Product-solstice\Solstice::Session
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
CVE-2024-47945
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-9.1||CRITICAL
EPSS-0.41% / 61.48%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 10:05
Updated-03 Nov, 2025 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Predictable Session ID

The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, leading to unauthorized access to user sessions. This is not only due to the use of an (insecure) rand() function call but also because of missing initialization via srand(). As a result only the PIDs are effectively used as seed.

Action-Not Available
Vendor-rittalRITTAL GmbH & Co. KGrittal_gmbh_and_co.kg
Product-iot_interfaceiot_interface_firmwarecmc_iii_processing_units_firmwarecmc_iii_processing_unitsIoT Interface & CMC III Processing Unitiot_interface_and_cmc_iii_processing_unit
CWE ID-CWE-331
Insufficient Entropy
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
CVE-2020-27634
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Contiki 4.5, TCP ISNs are improperly random.

Action-Not Available
Vendor-contiki-ngn/a
Product-contiki-ngn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-27636
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Microchip MPLAB Net 3.6.1, TCP ISNs are improperly random.

Action-Not Available
Vendor-microchipn/a
Product-mplab_network_creatorn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2024-1631
Matching Score-4
Assigner-DFINITY Foundation
ShareView Details
Matching Score-4
Assigner-DFINITY Foundation
CVSS Score-9.1||CRITICAL
EPSS-1.74% / 82.57%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 02:12
Updated-10 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
agent-js: Insecure Key Generation in `Ed25519KeyIdentity.generate`

Impact: The library offers a function to generate an ed25519 key pair via Ed25519KeyIdentity.generate with an optional param to provide a 32 byte seed value, which will then be used as the secret key. When no seed value is provided, it is expected that the library generates the secret key using secure randomness. However, a recent change broke this guarantee and uses an insecure seed for key pair generation. Since the private key of this identity (535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe) is compromised, one could lose funds associated with the principal on ledgers or lose access to a canister where this principal is the controller.

Action-Not Available
Vendor-dfinityInternet Computerdfinity
Product-icp-js-coreagent-jsagent-js
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-16271
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.37% / 58.92%
||
7 Day CHG~0.00%
Published-03 Aug, 2020 | 16:19
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.

Action-Not Available
Vendor-keen/a
Product-keepassrpcn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2025-40925
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 14.74%
||
7 Day CHG~0.00%
Published-20 Sep, 2025 | 12:31
Updated-22 Sep, 2025 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Starch versions 0.14 and earlier generate session ids insecurely

Starch versions 0.14 and earlier generate session ids insecurely. The default session id generator returns a SHA-1 hash seeded with a counter, the epoch time, the built-in rand function, the PID, and internal Perl reference addresses. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Action-Not Available
Vendor-BLUEFEET
Product-Starch
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
CVE-2026-27515
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 13.92%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 15:04
Updated-27 Feb, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Binardat 10G08-0800GSM Network Switch Predictable Session Identifiers

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictable numeric session identifiers in the web management interface. An attacker can guess valid session IDs and hijack authenticated sessions.

Action-Not Available
Vendor-binardatBinardat Ltd.
Product-10g08-0800gsm_firmware10g08-0800gsm10G08-0800GSM Network Switch
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2013-4102
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.44% / 63.20%
||
7 Day CHG~0.00%
Published-04 Nov, 2019 | 14:45
Updated-06 Aug, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cryptocat before 2.0.22 strophe.js Math.random() Random Number Generator Weakness

Action-Not Available
Vendor-cryptocat_projectn/a
Product-cryptocatn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-27635
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PicoTCP 1.7.0, TCP ISNs are improperly random.

Action-Not Available
Vendor-capgeminin/a
Product-picotcpn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-43501
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.32% / 55.23%
||
7 Day CHG~0.00%
Published-10 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones.

Action-Not Available
Vendor-elwscZUKEN Elmic
Product-kasago_ipv4kasago_ipv4_lightkasago_ipv6\/v4_dualkasago_mobile_ipv6Kasago IPv4Kasago IPv4 LightKasago IPv6/v4 DualKasago mobile IPv6
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2025-40931
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.1||CRITICAL
EPSS-0.03% / 7.80%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 01:41
Updated-21 Apr, 2026 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id. Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. Note that the libapache-session-perl package in some Debian-based Linux distributions may be patched to use Crypt::URandom.

Action-Not Available
Vendor-chornyCHORNY
Product-apache\Apache::Session::Generate::MD5
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
Details not found