Magento 2.2 prior to 2.2.10 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability

Summary

A cryptographically weak random number generator permits a malicious user to use brute force to access the confirmation code for customer registration.

Credit:

The information has been provided by rbsec

The original article can be found at:https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update


Details

Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1 uses cryptographically weak random number generator to brute-force the confirmation code for customer registration.

 

Vulnerable Systems:

Magento 2.2 prior to 2.2.10

Magento 2.3 prior to 2.3.3 or 2.3.2-p1 

 

CVE Information:

CVE-2019-8113

 

Disclosure Timeline:
Published Date:11/5/2019