This vulnerability occurs when software uses a pseudo-random number generator (PRNG) that is not cryptographically strong for security-sensitive operations, such as generating keys, tokens, or initialization vectors.
Using a non-cryptographic PRNG in a security context can expose your application to attacks. Attackers can often predict or reproduce the generated numbers, allowing them to forge sessions, decrypt data, or bypass authentication. This happens because these generators prioritize speed and efficiency over the unpredictability required for secure cryptography. Developers sometimes choose weaker PRNGs for performance reasons or because they are readily available in standard libraries. However, features that make these PRNGs efficient—like small internal states or deterministic seeding—are the same features that make them easy to break. For any security-related function, you must use a cryptographically secure pseudo-random number generator (CSPRNG) designed to withstand such analysis.
Impact: Bypass Protection Mechanism
If a PRNG is used for authentication and authorization, such as a session ID or a seed for generating a cryptographic key, then an attacker may be able to easily guess the ID or cryptographic key and gain access to restricted functionality.
javacMedium