First published: Thu Jan 30 2025(Updated: )
A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google gVisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10026 is rated as having a medium severity due to the potential for remote attackers to track devices.
To mitigate CVE-2024-10026, it is recommended to update to the latest version of Google gVisor where the hashing algorithm and secret sizes have been improved.
CVE-2024-10026 specifically affects the Google gVisor software.
CVE-2024-10026 highlights vulnerabilities associated with weak hashing algorithms that could lead to device tracking.
Yes, CVE-2024-10026 allows remote attackers to calculate local IP addresses which can aid in tracking devices.