4 vulnerabilities classified as CWE-343 (从先前值可预测取值范围). AI Chinese analysis included.
CWE-343 represents a critical weakness in cryptographic systems where a pseudo-random number generator fails to maintain sufficient entropy, allowing attackers to infer the next output based on previous values. This predictability typically enables exploitation in security-sensitive contexts, such as session token generation or cryptographic key creation, where an adversary can predict future values to hijack sessions or decrypt data. Developers mitigate this risk by implementing cryptographically secure pseudo-random number generators (CSPRNGs) that are designed to be non-deterministic and resistant to state-seizing attacks. It is essential to seed these generators with high-entropy sources and avoid using standard library functions like `rand()` for security purposes. Regular auditing of random number implementation ensures that the output remains statistically indistinguishable from true randomness, thereby preventing attackers from establishing predictive patterns.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32694 | Insecure Direct Object Reference attack via predictable secret ID in Juju — Juju | 6.6 | Medium | 2026-03-18 |
| CVE-2017-6030 | 多款Schneider Electric Modicon产品安全特征问题漏洞 — Schneider Electric Modicon PLCs | 7.3 | - | 2017-06-30 |
| CVE-2017-7901 | 多款Rockwell Automation产品安全漏洞 — Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 | 9.4 | - | 2017-06-30 |
| CVE-2014-5409 | GE Hydran M2 Predictable Value Range from Previous Values — Hydran M2, containing the 17046 Ethernet option | 5.3 | - | 2015-03-14 |
Vulnerabilities classified as CWE-343 (从先前值可预测取值范围) represent 4 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.