CWE一覧に戻る
CWE-336

疑似乱数生成器(PRNG)の同じシード

Same Seed in Pseudo-Random Number Generator (PRNG)
脆弱性 レビュー中
JA

疑似乱数生成器(PRNG)は、製品が初期化されるたびに同じシードを使用する。

PRNGの決定論的性質を考えると、各初期化に同じシードを使えば、同じ順序で同じ出力が得られることになる。もし攻撃者がシードを推測できる(または知っている)場合、攻撃者はPRNGから生成される乱数を決定できる可能性があります。

EN

A Pseudo-Random Number Generator (PRNG) uses the same seed each time the product is initialized.

Given the deterministic nature of PRNGs, using the same seed for each initialization will lead to the same output in the same order. If an attacker can guess (or knows) the seed, then the attacker may be able to determine the random numbers that will be produced from the PRNG.

Scope: Other, Access Control / Impact: Other; Bypass Protection Mechanism
Do not reuse PRNG seeds. Consider a PRNG that periodically re-seeds itself as needed from a high quality pseudo-random output, such as hardware devices.
Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems, or use the more recent FIPS 140-3 [REF-1192] if possible.
MITRE公式ページ — CWE-336