First published: Wed Mar 27 2024(Updated: )
RT-Thread through 5.0.2 generates random numbers with a weak algorithm of "seed = 214013L * seed + 2531011L; return (seed >> 16) & 0x7FFF;" in calc_random in drivers/misc/rt_random.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RT-Thread | <=5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25389 is classified as a medium severity vulnerability due to its impact on randomness generation.
To fix CVE-2024-25389, upgrade RT-Thread to version 5.0.3 or later where the random number generation algorithm has been improved.
The potential impacts of CVE-2024-25389 include vulnerabilities to cryptographic operations and reduced security in applications relying on randomness.
CVE-2024-25389 is not directly exploitable remotely, but its weak random number generation can lead to security risks in networked applications.
CVE-2024-25389 affects all RT-Thread versions up to and including 5.0.2.