CWE · MITRE source
CWE-337Predictable Seed in Pseudo-Random Number Generator (PRNG)
A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.
The use of predictable seeds significantly reduces the number of possible seeds that an attacker would need to test in order to predict which random numbers will be generated by the PRNG.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-7558 | 1.8 | 8.7 | 0.0020 | 2024-10-02 |
CVE-2022-26852 | 1.7 | 8.1 | 0.0143 | 2022-04-08 |
CVE-2025-55069 | 1.7 | 8.3 | 0.0004 | 2025-09-23 |
CVE-2020-28597 | 1.5 | 7.5 | 0.0037 | 2021-03-03 |
CVE-2026-25235 | 1.5 | 7.5 | 0.0005 | 2026-02-03 |
CVE-2026-26018 | 1.5 | 7.5 | 0.0003 | 2026-03-06 |
CVE-2022-40267 | 1.3 | 5.9 | 0.0218 | 2023-01-20 |
CVE-2023-49343 | 1.2 | 6.0 | 0.0003 | 2023-12-14 |
CVE-2025-62710 | 1.2 | 5.9 | 0.0002 | 2025-10-22 |
CVE-2016-15006 | 0.8 | 3.7 | 0.0029 | 2023-01-02 |
CVE-2025-20613 | 0.7 | 3.3 | 0.0003 | 2025-08-12 |
CVE-2024-22194 | 0.4 | 2.2 | 0.0003 | 2024-01-11 |
CVE-2025-7770 | 0.0 | 0.0 | 0.0012 | 2025-08-06 |