CVE-2016-1902

EUVD-2022-4395
The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
Affected Products (NVD)
VendorProductVersion
debiandebian_linux
8.0
sensiolabssymfony
𝑥
≤ 2.3.36
sensiolabssymfony
2.6.0
sensiolabssymfony
2.6.1
sensiolabssymfony
2.6.2
sensiolabssymfony
2.6.3
sensiolabssymfony
2.6.4
sensiolabssymfony
2.6.5
sensiolabssymfony
2.6.6
sensiolabssymfony
2.6.7
sensiolabssymfony
2.6.8
sensiolabssymfony
2.6.9
sensiolabssymfony
2.6.10
sensiolabssymfony
2.6.11
sensiolabssymfony
2.6.12
sensiolabssymfony
2.7.0
sensiolabssymfony
2.7.1
sensiolabssymfony
2.7.2
sensiolabssymfony
2.7.3
sensiolabssymfony
2.7.4
sensiolabssymfony
2.7.5
sensiolabssymfony
2.7.6
sensiolabssymfony
2.7.7
sensiolabssymfony
2.7.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
symfony
bookworm
5.4.23+dfsg-1+deb12u2
fixed
bullseye
4.4.19+dfsg-2+deb11u6
fixed
sid
6.4.13+dfsg-1
fixed
trixie
6.4.13+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
symfony
precise
dne
trusty
dne
vivid
ignored
wily
ignored
xenial
not-affected
Common Weakness Enumeration