#VU97983 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in DrayTek Corp. products - CVE-2024-41594
Published: October 3, 2024
Vulnerability identifier: #VU97983
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2024-41594
CWE-ID: CWE-338
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Vigor 1000B
Vigor 2962
Vigor 3910
Vigor 3912
Vigor 165
Vigor 166
Vigor 2135
Vigor 2763
Vigor 2765
Vigor 2766
Vigor 2865
Vigor 2866
Vigor 2915
Vigor 2620
Vigor LTE200
Vigor 2133
Vigor 2762
Vigor 2860
Vigor 2925
Vigor 2862
Vigor 2926
Vigor 2952
Vigor 3220
Vigor 2832
Vigor 1000B
Vigor 2962
Vigor 3910
Vigor 3912
Vigor 165
Vigor 166
Vigor 2135
Vigor 2763
Vigor 2765
Vigor 2766
Vigor 2865
Vigor 2866
Vigor 2915
Vigor 2620
Vigor LTE200
Vigor 2133
Vigor 2762
Vigor 2860
Vigor 2925
Vigor 2862
Vigor 2926
Vigor 2952
Vigor 3220
Vigor 2832
Software vendor:
DrayTek Corp.
DrayTek Corp.
Description
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to software uses a static string to seed the PRNG in OpenSSL for TLS. A remote attacker can perform MitM attack.
Remediation
Install updates from vendor's website.