Lucene search

K
githubGitHub Advisory DatabaseGHSA-4C72-MRHF-23CG
HistoryMay 14, 2022 - 2:52 a.m.

Apache Syncope uses a weak PNRG

2022-05-1402:52:41
CWE-338
GitHub Advisory Database
github.com
8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.3%

Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Affected configurations

Vulners
Node
org.apache.syncope\Matchsyncope
CPENameOperatorVersion
org.apache.syncope:syncopelt1.1.8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.3%

Related for GHSA-4C72-MRHF-23CG