We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
Reserved 2024-10-31 | Published 2025-01-30 | Updated 2025-02-06 | Assigner GoogleCWE-330 Use of Insufficiently Random Values
Amit Klein (Hebrew University of Jerusalem)
Inon Kaplan (Independent researcher)
Ron Even (Independent researcher)
fuchsia.googlesource.com/...6b3140f9175d6cf6ac4eb4e775f8dea8
fuchsia.googlesource.com/...cd013441daf4492f1ead349a9e5b80dc
Support options