Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-342 (从先前值可预测准确值) — Vulnerability Class 6

6 vulnerabilities classified as CWE-342 (从先前值可预测准确值). AI Chinese analysis included.

CWE-342 represents a critical weakness in cryptographic and security systems where the output of a random number generator is deterministic rather than truly random. This flaw allows attackers to predict future values by analyzing a sequence of previously observed outputs, effectively breaking the assumption of unpredictability required for secure operations. Exploitation typically involves capturing initial outputs, such as session tokens or encryption keys, and using statistical analysis or known algorithmic patterns to forecast subsequent values. This enables unauthorized access, session hijacking, or data decryption. To mitigate this risk, developers must implement cryptographically secure pseudorandom number generators (CSPRNGs) that incorporate sufficient entropy from multiple unpredictable sources. Regular auditing of randomization logic and avoiding custom implementations are essential practices to ensure that generated values remain statistically independent and resistant to prediction attacks.

MITRE CWE Description
An exact value or random number can be precisely predicted by observing previous values.
Common Consequences (1)
OtherVaries by Context
Mitigations (3)
Increase the entropy used to seed a PRNG.
Architecture and Design, RequirementsUse products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
ImplementationUse a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.

Vulnerabilities classified as CWE-342 (从先前值可预测准确值) represent 6 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.