Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-39218

Опубликовано: 20 сент. 2022
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

The JS Compute Runtime for Fastly's Compute@Edge platform provides the environment JavaScript is executed in when using the Compute@Edge JavaScript SDK. In versions prior to 0.5.3, the Math.random and crypto.getRandomValues methods fail to use sufficiently random values. The initial value to seed the PRNG (pseudorandom number generator) is baked-in to the final WebAssembly module, making the sequence of random values for that specific WebAssembly module predictable. An attacker can use the fixed seed to predict random numbers generated by these functions and bypass cryptographic security controls, for example to disclose sensitive data encrypted by functions that use these generators. The problem has been patched in version 0.5.3. No known workarounds exist.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:fastly:js-compute:*:*:*:*:*:node.js:*:*
Версия до 0.5.3 (исключая)

EPSS

Процентиль: 34%
0.00136
Низкий

7.5 High

CVSS3

Дефекты

CWE-335

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Fastly Compute@Edge JS Runtime has fixed random number seed during compilation

EPSS

Процентиль: 34%
0.00136
Низкий

7.5 High

CVSS3

Дефекты

CWE-335