Insufficient Random Number Generation in Intel Security Library
CVE-2021-0131
6.5MEDIUM
Summary
The Intel Security Library prior to version 3.3 is susceptible to vulnerabilities due to the use of a cryptographically weak pseudo-random number generator (PRNG). This weakness may allow authenticated users to exploit network access and potentially disclose sensitive information, undermining system integrity and security protocols.
Affected Version(s)
Intel(R) Security Library before version 3.3
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved