Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2022-33738
Summary
OpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- HIGH
- NONE
CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
References
Advisory Timeline
- Published