BTCPay Server through 1.0.7.0 uses a weak method Next to produce pseudo-random values to generate a legacy API key.
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
Link | Tags |
---|---|
https://github.com/btcpayserver/btcpayserver/releases | third party advisory release notes |
https://blog.btcpayserver.org/vulnerability-disclosure-v1-0-7-0/ | vendor advisory |