Rapid7 Vulnerability & Exploit Database

Alpine Linux: CVE-2022-35255: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Alpine Linux: CVE-2022-35255: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
12/05/2022
Created
04/09/2024
Added
03/26/2024
Modified
10/02/2024

Description

A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.

Solution(s)

  • alpine-linux-upgrade-nodejs
  • alpine-linux-upgrade-nodejs-current

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;