2 vulnerabilities classified as CWE-1279. AI Chinese analysis included.
CWE-1279 is a critical initialization weakness where cryptographic operations execute before essential supporting hardware units, such as random-number generators, are fully initialized. This vulnerability typically arises in embedded systems or secure enclaves where timing dependencies between components are not strictly managed. Attackers exploit this race condition by triggering encryption before the entropy source is ready, potentially resulting in weak keys, predictable outputs, or complete cryptographic failure. To mitigate this risk, developers must implement robust synchronization mechanisms that verify the readiness of all dependent hardware modules before initiating any cryptographic processes. This often involves polling status registers, using hardware interrupts, or enforcing strict boot sequences that guarantee all security-critical units are operational and validated prior to their first use in sensitive operations.
If random_number_generator_self_test_passed() == TRUE then Seed = get_random_number_from_RNG() else Seed = hardcoded_numberIf random_number_generator_self_test_passed() == TRUE then Seed = get_random_number_from_RNG() else enter_error_state()| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-22473 | Uninitialized TRNG used for ECDSA after EM2/EM3 sleep for VSE devices — GSDK | 6.8 | Medium | 2024-02-21 |
| CVE-2023-4489 | Z/IP Gateway Use of Uninitialized PRNG when Generating S0 Encryption Key — Z/IP Gateway SDK | 6.4 | Medium | 2023-12-14 |
Vulnerabilities classified as CWE-1279 represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.