Cyber Posture

CWE · MITRE source

CWE-331Insufficient Entropy

Abstraction: Base · CVEs in our corpus: 124

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
SC-12Cryptographic Key Establishment and ManagementSCApproved key-establishment methods mandate sufficient entropy during key generation, eliminating entropy-starved keys.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2008-14476.66.80.86702008-07-08
CVE-2018-158126.27.50.77972019-07-03
CVE-2018-183266.17.50.76302019-07-03
CVE-2015-34052.57.50.16562017-08-09
CVE-2008-21082.39.80.05612008-05-07
CVE-2017-139922.18.10.08282017-10-05
CVE-2018-10006202.09.80.00272018-07-09
CVE-2013-22602.09.80.00502019-11-04
CVE-2020-127352.09.80.00542020-05-08
CVE-2020-102852.09.80.00372020-07-15
CVE-2021-330272.09.80.00612021-07-19
CVE-2021-227272.09.80.00602021-07-21
CVE-2021-362942.09.80.00422022-01-25
CVE-2021-416152.09.80.00332022-08-08
CVE-2022-342942.09.80.00782022-08-15
CVE-2023-43442.09.80.00082023-08-15
CVE-2023-495992.09.80.00292024-01-10
CVE-2024-257302.09.80.00172024-02-23
CVE-2024-479452.09.80.00412024-10-15
CVE-2025-477812.09.80.00682025-05-14
CVE-2025-665652.09.80.00072025-12-09
CVE-2020-369252.09.80.00612026-01-06
CVE-2024-364001.99.40.00332024-06-04
CVE-2017-188831.89.10.00312020-06-19
CVE-2022-374011.88.80.00442022-08-15