CVE-2024-4772Use of Cryptographically Weak Pseudo-Random Number Generator in Mozilla Firefox

Severity
5.9MEDIUMNVD
OSV8.8
EPSS
0.1%
top 81.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 14
Latest updateMay 29

Description

An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.5 | Impact: 3.4

Affected Packages3 packages

CVEListV5mozilla/firefoxunspecified126
NVDmozilla/firefox< 126.0
Ubuntumozilla/firefox< 126.0+build2-0ubuntu0.20.04.1+1

🔴Vulnerability Details

5
OSV
firefox regressions2024-05-29
OSV
firefox vulnerabilities2024-05-21
OSV
CVE-2024-4772: An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values2024-05-14
GHSA
GHSA-64f6-885c-52vw: An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values2024-05-14
CVEList
CVE-2024-4772: An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values2024-05-14

📋Vendor Advisories

5
Ubuntu
Firefox regressions2024-05-29
Ubuntu
Firefox vulnerabilities2024-05-21
Microsoft
An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.2024-05-14
Debian
CVE-2024-4772: firefox - An HTTP digest authentication nonce value was generated using `rand()` which cou...2024
Mozilla
Mozilla Foundation Security Advisory 2024-21: CVE-2024-4772
CVE-2024-4772 — Mozilla Firefox vulnerability | cvebase