Miggo Logo

CVE-2013-0342:
pyrad uses sequential packet IDs

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.78738%
Published
5/5/2022
Updated
10/24/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pyradpip< 2.12.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references the CreateID function in packet.py as the source of sequential/predictable IDs. The GitHub commit shows this function was modified to use a cryptographic RNG (SystemRandom), confirming the original implementation used insecure randomness. While other parts of the code (e.g., CurrentID initialization) were also patched, the CVE description and commit focus on CreateID as the primary vulnerability vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *r**t*I* *un*tion in p**k*t.py in pyr** ***or* *.* us*s s*qu*nti*l p**k*t I*s, w*i** m*k*s it **si*r *or r*mot* *tt**k*rs to spoo* p**k*ts *y pr**i*tin* t** n*xt I*, * *i***r*nt vuln*r**ility t**n *V*-****-****.

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s t** `*r**t*I*` *un*tion in `p**k*t.py` *s t** sour** o* s*qu*nti*l/pr**i*t**l* I*s. T** *it*u* *ommit s*ows t*is *un*tion w*s mo*i*i** to us* * *rypto*r*p*i* RN* (`Syst*mR*n*om`), *on*irmin* t** ori*in*l impl*m