Skip to main content

Use of Insufficiently Random Values


Severity High
Score 9.8/10


A vulnerability was found in kapetan dns prior to 7.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file "DNS/Protocol/Request.cs". The manipulation leads to insufficient entropy in "prng". The attack may be launched remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.

  • LOW
  • HIGH
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-330 - Use of Insufficiently Random Values

The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

Advisory Timeline

  • Published