Insecure Random Number Generation Affecting com.typesafe.akka:akka-actor_2.11 package, versions [2.5.0, 2.5.16)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.17% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insecure Random Number Generation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMTYPESAFEAKKA-451678
  • published22 Jul 2019
  • disclosed29 Aug 2018
  • creditRafal Sumislawski

Introduced: 29 Aug 2018

CVE-2018-16115  (opens in a new tab)
CWE-338  (opens in a new tab)

How to fix?

Upgrade com.typesafe.akka:akka-actor_2.11 to version 2.5.16 or higher.

Overview

com.typesafe.akka:akka-actor_2.11 is a toolkit for building highly concurrent, distributed, and resilient message-driven applications for Java and Scala.

Affected versions of this package are vulnerable to Insecure Random Number Generation. When a custom random number generator is configured, if the AES128CounterSecureRNG and AES256CounterSecureRNG are enabled, a malicious user could easily guess the random number used during encryption and possibly eavesdrop onto ongoing communications. This is due a bug in the AES128CounterSecureRNG and AES256CounterSecureRNG implementations, causing the generated numbers to repeat themselves after a few bytes.

CVSS Scores

version 3.1