Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
References
| Link | Resource |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-23-0293 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
31 May 2023, 22:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:* cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:* |
|
| References | (MISC) https://www.usom.gov.tr/bildirim/tr-23-0293 - Third Party Advisory | |
| First Time |
Cbot
Cbot cbot Panel Cbot cbot Core |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
25 May 2023, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-05-25 09:15
Updated : 2023-08-02 17:15
NVD link : CVE-2023-2884
Mitre link : CVE-2023-2884
JSON object : View
Products Affected
cbot
- cbot_core
- cbot_panel
