CWE-336 - Same Seed in Pseudo-Random Number Generator (PRNG)
CWE-336
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
Same Seed in Pseudo-Random Number Generator (PRNG)
- Description
A Pseudo-Random Number Generator (PRNG) uses the same seed each time the product is initialized.
Given the deterministic nature of PRNGs, using the same seed for each initialization will lead to the same output in the same order. If an attacker can guess (or knows) the seed, then the attacker may be able to determine the random numbers that will be produced from the PRNG.
- Common Consequences
Scope: Other, Access Control
Impact: Other, Bypass Protection Mechanism
- Related Weaknesses
- Release Date:
- 2006-07-19
- Latest Modification Date:
- 2023-10-26
Free security scan for your website