CWE一覧に戻る
CWE-332

PRNGのエントロピー不足

Insufficient Entropy in PRNG
脆弱性 レビュー中
JA

疑似乱数生成器(PRNG)で利用可能な、あるいは利用されるエントロピーの欠如は、安定性とセキュリティの脅威となり得る。

EN

The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security threat.

Scope: Availability / Impact: DoS: Crash, Exit, or Restart
Scope: Access Control, Other / Impact: Bypass Protection Mechanism; Other
Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
Consider a PRNG that re-seeds itself as needed from high-quality pseudo-random output, such as hardware devices.
When deciding which PRNG to use, look at its sources of entropy. Depending on what your security needs are, you may need to use a random number generator that always uses strong random data -- i.e., a random number generator that attempts to be strong but will fail in a weak way or will always provide some middle ground of protection through techniques like re-seeding. Generally, something that always provides a predictable amount of strength is preferable.
MITRE公式ページ — CWE-332