Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
Security Weakness
|
| gptkbp:consequence |
Predictable random values
Weak cryptographic keys |
| gptkbp:describes |
A weakness where a system does not use sufficient entropy in security-critical operations, such as cryptographic key generation.
|
| gptkbp:maintainedBy |
gptkb:MITRE_Corporation
|
| gptkbp:mitigatedBy |
Ensure sufficient entropy sources
Use strong random number generators |
| gptkbp:name |
Insufficient Entropy
|
| gptkbp:partOf |
gptkb:CWE
|
| gptkbp:referencedIn |
https://cwe.mitre.org/data/definitions/331.html
|
| gptkbp:relatedTo |
CWE-330
CWE-332 |
| gptkbp:usedIn |
Software Security Assessment
|
| gptkbp:vulnerableTo |
331
|
| gptkbp:bfsParent |
gptkb:CVE-2017-15361
gptkb:CWE-310 |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-331
|