CWE-332
Insufficient Entropy in PRNG
The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.
CVE-2017-9371 (GCVE-0-2017-9371)
Vulnerability from cvelistv5
Published
2017-11-14 21:00
Modified
2025-08-22 15:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Loss of integrity vulnerability
- CWE-332 - Insufficient Entropy in PRNG
Summary
In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, a loss of integrity vulnerability in the default configuration of the QNX SDP could allow an attacker being able to reduce the entropy of the PRNG, making other blended attacks more practical by gaining control over environmental factors that influence seed generation.
References
▼ | URL | Tags |
---|---|---|
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000046674 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
BlackBerry | QNX Software Development Platform (QNX SDP) |
Version: 6.6.0 Version: 6.5.0 SP1 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000046674" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "QNX Software Development Platform (QNX SDP)", "vendor": "BlackBerry", "versions": [ { "status": "affected", "version": "6.6.0" }, { "status": "affected", "version": "6.5.0 SP1 and earlier" } ] } ], "datePublic": "2017-11-14T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, a loss of integrity vulnerability in the default configuration of the QNX SDP could allow an attacker being able to reduce the entropy of the PRNG, making other blended attacks more practical by gaining control over environmental factors that influence seed generation.\u003c/p\u003e" } ], "value": "In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, a loss of integrity vulnerability in the default configuration of the QNX SDP could allow an attacker being able to reduce the entropy of the PRNG, making other blended attacks more practical by gaining control over environmental factors that influence seed generation." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Loss of integrity vulnerability", "lang": "en" } ] }, { "descriptions": [ { "cweId": "CWE-332", "description": "CWE-332 Insufficient Entropy in PRNG", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-22T15:05:29.013Z", "orgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c", "shortName": "blackberry" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000046674" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@blackberry.com", "DATE_PUBLIC": "2017-11-14T00:00:00", "ID": "CVE-2017-9371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QNX Software Development Platform (QNX SDP)", "version": { "version_data": [ { "version_value": "6.6.0" }, { "version_value": "6.5.0 SP1 and earlier" } ] } } ] }, "vendor_name": "BlackBerry" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, a loss of integrity vulnerability in the default configuration of the QNX SDP could allow an attacker being able to reduce the entropy of the PRNG, making other blended attacks more practical by gaining control over environmental factors that influence seed generation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Loss of integrity vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000046674", "refsource": "CONFIRM", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000046674" } ] } } } }, "cveMetadata": { "assignerOrgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c", "assignerShortName": "blackberry", "cveId": "CVE-2017-9371", "datePublished": "2017-11-14T21:00:00Z", "dateReserved": "2017-06-02T00:00:00", "dateUpdated": "2025-08-22T15:05:29.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-2
Phases: Architecture and Design, Requirements
Strategy: Libraries or Frameworks
Description:
- Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
Mitigation
Phase: Implementation
Description:
- Consider a PRNG that re-seeds itself as needed from high-quality pseudo-random output, such as hardware devices.
Mitigation
Phase: Architecture and Design
Description:
- When deciding which PRNG to use, look at its sources of entropy. Depending on what your security needs are, you may need to use a random number generator that always uses strong random data -- i.e., a random number generator that attempts to be strong but will fail in a weak way or will always provide some middle ground of protection through techniques like re-seeding. Generally, something that always provides a predictable amount of strength is preferable.
No CAPEC attack patterns related to this CWE.