This vulnerability occurs when a system fails to properly manage the limited or unpredictable output rate of a true random number generator (TRNG), potentially causing failures, delays, or weakened security.
True Random Number Generators (TRNGs) rely on unpredictable physical processes, like electronic noise, to produce entropy. Unlike software-based generators, their output rate is inherently limited and can sometimes stall if the entropy source is exhausted, causing applications to hang or fail when they demand random data faster than the hardware can supply. For security-critical operations, such as cryptographic key generation or session token creation, this limitation is a major risk. Developers must design their systems to handle these slow or blocked states gracefully—for example, by using TRNG output only to seed cryptographically secure pseudorandom number generators (CSPRNGs)—and avoid using TRNGs directly in performance-sensitive or synchronous loops where a delay could break functionality.
Impact: DoS: Crash, Exit, or Restart
A program may crash or block if it runs out of random numbers.
cLow