Insecure Randomness Affecting pyrad package, versions [,2.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.96% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insecure Randomness vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYRAD-40007
  • published1 Aug 2017
  • disclosed15 Feb 2013
  • creditNathaniel McCallum

Introduced: 15 Feb 2013

CVE-2013-0294  (opens in a new tab)
CWE-330  (opens in a new tab)

How to fix?

Upgrade to version [,2.1) or greater.

Overview

pyrad is a RADIUS tools.

Affected versions of this package are vulnerable to Insecure Randomness. It was using Python's random module in a number of places to generate pseudo-random data. In the case of the authenticator data, it was being used to secure a password sent over the wire. Because Python's random module is not really suited for this purpose (not random enough), it could lead to password hashing that may be predictable.

Note: CVE-2013-0295 is a duplicate of CVE-2013-0294.

CVSS Base Scores

version 3.1