CVE-2017-16031:
Insecure randomness in socket.io
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60273%
CWE
Published
11/7/2018
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
socket.io | npm | <= 0.9.6 | 0.9.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the insecure use of Math.random() in the ID generation process. The commit 67b4eb9 explicitly replaces Math.random() with crypto.randomBytes in Manager.prototype.generateId, confirming this was the vulnerable function. The CWE-330 classification and advisory descriptions directly match this pattern of insufficient randomness in cryptographic identifiers.