Search for vulnerabilities
Vulnerability details: VCID-fq1f-pcr9-aaak
Vulnerability ID VCID-fq1f-pcr9-aaak
Aliases CVE-2019-1549
VC-OPENSSL-20190910-CVE-2019-1549
Summary OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1549.html
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1336
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1337
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1840
cvssv3 4.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1549.json
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01361 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01399 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01399 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.01977 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02708 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02860 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02860 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02860 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
epss 0.02860 https://api.first.org/data/v1/epss?cve=CVE-2019-1549
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1752095
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549
cvssv3 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2019-1549
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2019-1549
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2019-1549
generic_textual Low https://ubuntu.com/security/notices/USN-4376-1
generic_textual Low https://usn.ubuntu.com/usn/usn-4376-1
generic_textual Low https://www.openssl.org/news/secadv/20190910.txt
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuapr2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuapr2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujul2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujul2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
generic_textual CRITICAL https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1549.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1549.json
https://api.first.org/data/v1/epss?cve=CVE-2019-1549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/openssl/openssl/commit/1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/1
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K44070243
https://support.f5.com/csp/article/K44070243?utm_source=f5support&amp%3Butm_medium=RSS
https://support.f5.com/csp/article/K44070243?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/usn/usn-4376-1
https://www.debian.org/security/2019/dsa-4539
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
1752095 https://bugzilla.redhat.com/show_bug.cgi?id=1752095
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
CVE-2019-1549 https://nvd.nist.gov/vuln/detail/CVE-2019-1549
RHSA-2020:1336 https://access.redhat.com/errata/RHSA-2020:1336
RHSA-2020:1337 https://access.redhat.com/errata/RHSA-2020:1337
RHSA-2020:1840 https://access.redhat.com/errata/RHSA-2020:1840
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1549.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1549
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1549
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1549
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuapr2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujul2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.78455
EPSS Score 0.01361
Published At April 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.