CVE-2023-31124
low-risk
Published 2023-05-25
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Vendors
References (10)
Third Party Advisory
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Third Party Advisory
https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
Third Party Advisory
https://security.gentoo.org/glsa/202310-09
Third Party Advisory
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Third Party Advisory
https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
Third Party Advisory
https://security.gentoo.org/glsa/202310-09
22
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
9/34 · Low