{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-9426","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","state":"PUBLISHED","assignerShortName":"google_android","dateReserved":"2018-04-05T00:00:00.000Z","datePublished":"2024-12-02T21:30:27.265Z","dateUpdated":"2024-12-03T15:07:45.180Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Android","vendor":"Google","versions":[{"status":"affected","version":"7"},{"status":"affected","version":"7.1.1"},{"status":"affected","version":"7.1.2"},{"status":"affected","version":"8"},{"status":"affected","version":"8.1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">In &nbsp;RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java,&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">an incorrect implementation could cause weak RSA key pairs being generated.&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">This could lead to crypto vulnerability with no additional execution&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">privileges needed. User interaction is not needed for exploitation.&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard.</span><br>"}],"value":"In  RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java, an incorrect implementation could cause weak RSA key pairs being generated. This could lead to crypto vulnerability with no additional execution privileges needed. User interaction is not needed for exploitation. Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard."}],"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2024-12-02T21:30:27.265Z"},"references":[{"url":"https://source.android.com/docs/security/bulletin/pixel/2018-07-01"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-331","lang":"en","description":"CWE-331 Insufficient Entropy"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"ADJACENT_NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-12-03T14:59:30.299610Z","id":"CVE-2018-9426","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-03T15:07:45.180Z"}}]}}