11 vulnerabilities classified as CWE-337 (PRNG中使用可预测种子). AI Chinese analysis included.
CWE-337 represents a critical cryptographic weakness where a pseudo-random number generator is initialized using a predictable seed, such as the system time or process identifier. This flaw fundamentally undermines security because it drastically reduces the entropy required to predict future outputs. Attackers typically exploit this vulnerability by reverse-engineering the seed source, allowing them to reproduce the exact sequence of random numbers generated by the application. This capability enables unauthorized access to session tokens, encryption keys, or other sensitive data that relies on the PRNG for secrecy. To mitigate this risk, developers must avoid deterministic inputs and instead utilize cryptographically secure random number generators that draw entropy from the operating system’s hardware sources. Ensuring high unpredictability in seed generation is essential for maintaining the integrity of security mechanisms dependent on randomness.
Random random = new Random(System.currentTimeMillis()); int accountID = random.nextInt();srand(time()); int randNum = rand();Vulnerabilities classified as CWE-337 (PRNG中使用可预测种子) represent 11 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.