Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access.

Published at
2021-06-09
221 days ago
Modified
2021-06-09
221 days ago
2021
Year
The year of the turtle

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html

MISC:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html

Vulnerability RAW

{
	"Title": {
		"_text": "CVE-2021-0131"
	},
	"Notes": {
		"Note": [
			{
				"_text": "Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access."
			},
			{
				"_text": "2021-06-09"
			},
			{
				"_text": "2021-06-09"
			}
		]
	},
	"CVE": {
		"_text": "CVE-2021-0131"
	},
	"References": {
		"Reference": {
			"URL": {
				"_text": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html"
			},
			"Description": {
				"_text": "MISC:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html"
			}
		}
	}
}