An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1870579 | Issue Tracking Exploit Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-21/ | Vendor Advisory |
| https://bugzilla.mozilla.org/show_bug.cgi?id=1870579 | Issue Tracking Exploit Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-21/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-05-14 18:15
Updated : 2025-04-01 17:52
NVD link : CVE-2024-4772
Mitre link : CVE-2024-4772
CVE.ORG link : CVE-2024-4772
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
