CVE-2018-12520

EUVD-2018-4490
An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host running the service and the username of the user whose session they're targeting can abuse the deterministic random number generation in order to hijack the user's session, thus escalating their access.
PRNG
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
ntopntopng
3.4 ≤
𝑥
< 3.4.180617
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ntopng
jessie
no-dsa
sid
5.2.1+dfsg1-2
fixed
stretch
no-dsa
trixie
5.2.1+dfsg1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ntopng
artful
ignored
bionic
Fixed 3.2+dfsg1-1ubuntu0.1~esm2
released
cosmic
ignored
disco
not-affected
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
dne
jammy
not-affected
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
Fixed 2.2+dfsg1-1ubuntu0.1~esm2
released