pyrad is vulnerable to the use of Insufficiently Random Values
High severity
GitHub Reviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated Oct 23, 2024
Description
Published by the National Vulnerability Database
Jan 28, 2020
Published to the GitHub Advisory Database
May 5, 2022
Reviewed
Feb 23, 2024
Last updated
Oct 23, 2024
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
References