CVE-2016-10743Insufficient Entropy in PRNG in Hostapd

Severity
7.5HIGHNVD
EPSS
0.4%
top 37.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMay 14

Description

hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDw1.fi/hostapd< 2.6

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9m94-6895-mgv3: hostapd before 22022-05-14
OSV
CVE-2016-10743: hostapd before 22019-03-23
CVEList
CVE-2016-10743: hostapd before 22019-03-23

📋Vendor Advisories

4
Red Hat
hostapd: Not preventig the use of low quality PRNG in EAP mode leads to insufficient entropy2020-02-27
Ubuntu
wpa_supplicant and hostapd vulnerabilities2019-04-10
Red Hat
hostapd: Not preventig the use of low quality PRNG leads to insufficient entropy2016-02-19
Debian
CVE-2016-10743: wpa - hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached ...2016

💬Community

2
Bugzilla
CVE-2019-10064 hostapd: Not preventig the use of low quality PRNG in EAP mode leads to insufficient entropy2020-03-06
Bugzilla
CVE-2016-10743 hostapd: Not preventig the use of low quality PRNG leads to insufficient entropy2020-03-06
CVE-2016-10743 — Insufficient Entropy in PRNG | cvebase