
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-31147 affects c-ares, an asynchronous resolver library. The vulnerability was discovered in May 2023 and fixed in version 1.19.1. The issue occurs when /dev/urandom or RtlGenRandom() are unavailable, causing c-ares to use rand() to generate random numbers for DNS query IDs, leading to insufficient randomness in the generation process (GitHub Advisory).
The vulnerability has a CVSS v3.1 base score of 5.9 (Moderate) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N. The technical issue involves three main components: 1) The use of unseeded rand() function for generating DNS query IDs when primary random sources are unavailable, 2) A non-compliant RC4 implementation that may not provide the same strength as the original RC4 implementation, and 3) Lack of support for modern OS-provided CSPRNGs like arc4random() (GitHub Advisory, OSS Security).
The vulnerability could lead to predictable DNS query IDs due to insufficient randomness in their generation. This weakness potentially allows attackers to predict query IDs, which could facilitate DNS spoofing attacks (GitHub Advisory).
The vulnerability has been fixed in c-ares version 1.19.1. The fix includes: detecting and using arc4random() when available, using /dev/urandom or RtlGenRandom() directly as a fallback, and improving the last-resort rand() + RC4 logic by implementing the official RC4 algorithm and properly seeding rand() with srand(). No workarounds are available for unpatched systems (GitHub Release, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."