An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1870579 | vendor advisory issue tracking exploit |
https://www.mozilla.org/security/advisories/mfsa2024-21/ | vendor advisory |