Lucene search

K
githubGitHub Advisory DatabaseGHSA-V367-P58W-98H5
HistoryMay 17, 2022 - 1:46 a.m.

PyCrypto makes Use of Insufficiently Random Values

2022-05-1701:46:08
GitHub Advisory Database
github.com
9

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.6%

PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.

Affected configurations

Vulners
Node
pycryptoarc2Range<2.6
CPENameOperatorVersion
pycryptolt2.6

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.6%