CWE-339: Small Seed Space in PRNG

ID CWE-339
Abstraction Variant
Structure Simple
Status Draft
A Pseudo-Random Number Generator (PRNG) uses a relatively small seed space, which makes it more susceptible to brute force attacks.

PRNGs are entirely deterministic once seeded, so it should be extremely difficult to guess the seed. If an attacker can collect the outputs of a PRNG and then brute force the seed by trying every possibility to see which seed matches the observed output, then the attacker will know the output of any subsequent calls to the PRNG. A small seed space implies that the attacker will have far fewer possible values to try to exhaust all possibilities.

Modes of Introduction

Phase Note
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) Base Simple Draft
CWE-1000 Research Concepts Draft CWE-341 Predictable from Observable State Base Simple Draft
Loading...
Loading...