#VU57321 Use of insufficiently random values in keypair - CVE-2021-41117

 

#VU57321 Use of insufficiently random values in keypair - CVE-2021-41117

Published: October 13, 2021 / Updated: August 16, 2024


Vulnerability identifier: #VU57321
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2021-41117
CWE-ID: CWE-330
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
keypair
Software vendor:
Julian Gruber

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an error in the pseudo-random number generator used by keypair to generate RSA keys for SSH connections. A remote attacker can generate duplicate SSH keys and gain unauthorized access to the affected systems.


Remediation

Install updates from vendor's website.

Note, just installing an update is not enough to fix the problem. You need to replace all previously generated SSH keys.


External links