This vulnerability occurs when a Pseudo-Random Number Generator (PRNG) uses an easily guessable starting value, like the current system time or a process ID, to begin its sequence.
A PRNG's security depends heavily on the secrecy and unpredictability of its initial seed. When developers use common, low-entropy sources—such as timestamps, process IDs, or other publicly available system values—they dramatically shrink the pool of possible starting points. An attacker can often deduce or narrow down these seeds with minimal effort, compromising the entire random sequence that follows. In practice, this means that cryptographic operations, session tokens, random identifiers, or any security mechanism relying on this PRNG become predictable. Instead of facing a vast, unguessable number of possibilities, an attacker can run a small, feasible set of seed guesses to replicate the generator's output, bypassing protections that were assumed to be random.
Impact: Varies by Context
Strategy: Libraries or Frameworks
javac