Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34330 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7. |
Fixes
Solution
Update the Core to >= v4.0.3.4 and the Panel to >= v4.0.3.7 .
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-23-0293 |
|
History
Wed, 15 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2025-01-15T20:59:51.037Z
Reserved: 2023-05-25T08:03:27.613Z
Link: CVE-2023-2884
Updated: 2024-08-02T06:41:02.451Z
Status : Modified
Published: 2023-05-25T09:15:12.163
Modified: 2024-11-21T07:59:29.610
Link: CVE-2023-2884
No data.
OpenCVE Enrichment
No data.
EUVD