CVE-2023-2884

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
References
Link Resource
https://www.usom.gov.tr/bildirim/tr-23-0293 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*
cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*

History

31 May 2023, 22:45

Type Values Removed Values Added
References (MISC) https://www.usom.gov.tr/bildirim/tr-23-0293 - (MISC) https://www.usom.gov.tr/bildirim/tr-23-0293 - Third Party Advisory
CVSS v2 : unknown
v3 : 6.4
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*
cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*
First Time Cbot cbot Panel
Cbot cbot Core
Cbot

Information

Published : 2023-05-25 09:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-2884

Mitre link : CVE-2023-2884

CVE.ORG link : CVE-2023-2884


JSON object : View

Products Affected

cbot

  • cbot_core
  • cbot_panel
CWE
CWE-330

Use of Insufficiently Random Values

CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)