aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5084 aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
Github GHSA Github GHSA GHSA-r48h-jr2j-9g78 HashiCorp Terraform Amazon Web Services (AWS) uses an insecure PRNG
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00437}

epss

{'score': 0.00449}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T07:10:47.407Z

Reserved: 2018-03-27T00:00:00

Link: CVE-2018-9057

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-03-27T18:29:00.307

Modified: 2024-11-21T04:14:53.183

Link: CVE-2018-9057

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.