Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-69217
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-30 Dec, 2025 | 00:41
Updated At-30 Dec, 2025 | 15:57
Rejected At-
▼CVE Numbering Authority (CNA)
Coturn has unsafe nonce and relay port randomization due to weak random number generation.

coturn is a free open source implementation of TURN and STUN Server. Versions 4.6.2r5 through 4.7.0-r4 have a bad random number generator for nonces and port randomization after refactoring. Additionally, random numbers aren't generated with openssl's RAND_bytes but libc's random() (if it's not running on Windows). When fetching about 50 sequential nonces (i.e., through sending 50 unauthenticated allocations requests) it is possible to completely reconstruct the current state of the random number generator, thereby predicting the next nonce. This allows authentication while spoofing IPs. An attacker can send authenticated messages without ever receiving the responses, including the nonce (requires knowledge of the credentials, which is e.g., often the case in IoT settings). Since the port randomization is deterministic given the pseudorandom seed, an attacker can exactly reconstruct the ports and, hence predict the randomization of the ports. If an attacker allocates a relay port, they know the current port, and they are able to predict the next relay port (at least if it is not used before). Commit 11fc465f4bba70bb0ad8aae17d6c4a63a29917d9 contains a fix.

Affected Products
Vendor
coturn
Product
coturn
Versions
Affected
  • >= 4.6.2r5, <= 4.7.0-r4
Problem Types
TypeCWE IDDescription
CWECWE-338CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Type: CWE
CWE ID: CWE-338
Description: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/coturn/coturn/security/advisories/GHSA-fvj6-9jhg-9j84
x_refsource_CONFIRM
https://github.com/coturn/coturn/commit/11fc465f4bba70bb0ad8aae17d6c4a63a29917d9
x_refsource_MISC
https://github.com/coturn/coturn/commit/88ced471385869d7e7fbbc4766e78ef521b36af6
x_refsource_MISC
Hyperlink: https://github.com/coturn/coturn/security/advisories/GHSA-fvj6-9jhg-9j84
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/coturn/coturn/commit/11fc465f4bba70bb0ad8aae17d6c4a63a29917d9
Resource:
x_refsource_MISC
Hyperlink: https://github.com/coturn/coturn/commit/88ced471385869d7e7fbbc4766e78ef521b36af6
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found