Impact
The vulnerability arises from a predictable seed in the pseudo‑random number generator used by Mbed TLS and TF‑PSA‑Crypto. A determined attacker can predict the output of the PRNG, allowing compromise of cryptographic material such as keys, nonces, or session tokens. The weakness is formally identified as CWE‑338 and can result in loss of confidentiality and integrity for any encryption or authentication relying on the affected randomness source.
Affected Systems
Embedded systems and applications that incorporate ARM's Mbed TLS library prior to version 3.6.6, or the 4.x series before 4.1.0, and TF‑PSA‑Crypto before 1.1.0 are affected. These libraries are widely used in IoT firmware, secure boot solutions, and trust‑zone APIs on ARM processors.
Risk and Exploitability
The severity score of 6.7 places this issue in the medium‑high range. The EPSS score is less than 1 %, indicating a low probability of exploitation, and it is not listed in the CISA KEV catalog. Because the flaw is limited to the PRNG seed, exploitation requires an attacker who can influence or observe the seeding process, which is generally available to local or remote firmware running with the affected library. The cryptographic compromise potential makes this a critical concern for systems that treat PRNG output as fully random.
OpenCVE Enrichment
Debian DLA