Search for vulnerabilities
Vulnerability details: VCID-vmy4-5p4s-mbec
Vulnerability ID VCID-vmy4-5p4s-mbec
Aliases CVE-2023-31124
GHSA-54xr-f67r-4pc4
Summary Use of Insufficiently Random Values c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
Status Published
Exploitability 0.5
Weighted Severity 3.3
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31124.json
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2023-31124
cvssv3.1 3.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 3.7 https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
ssvc Track https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
cvssv3.1 3.7 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
ssvc Track https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
cvssv3.1 3.7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
cvssv3.1 3.7 https://nvd.nist.gov/vuln/detail/CVE-2023-31124
cvssv3.1 3.7 https://security.gentoo.org/glsa/202310-09
ssvc Track https://security.gentoo.org/glsa/202310-09
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31124.json
https://api.first.org/data/v1/epss?cve=CVE-2023-31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
202310-09 https://security.gentoo.org/glsa/202310-09
2209494 https://bugzilla.redhat.com/show_bug.cgi?id=2209494
cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
CVE-2023-31124 https://nvd.nist.gov/vuln/detail/CVE-2023-31124
GHSA-54xr-f67r-4pc4 https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
RHSA-2023:3577 https://access.redhat.com/errata/RHSA-2023:3577
RHSA-2023:3586 https://access.redhat.com/errata/RHSA-2023:3586
RHSA-2023:4033 https://access.redhat.com/errata/RHSA-2023:4033
RHSA-2023:4034 https://access.redhat.com/errata/RHSA-2023:4034
RHSA-2023:4035 https://access.redhat.com/errata/RHSA-2023:4035
RHSA-2023:4036 https://access.redhat.com/errata/RHSA-2023:4036
RHSA-2023:4039 https://access.redhat.com/errata/RHSA-2023:4039
RHSA-2023:6635 https://access.redhat.com/errata/RHSA-2023:6635
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31124.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:36:12Z/ Found at https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:36:12Z/ Found at https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:36:12Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:36:12Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-31124
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://security.gentoo.org/glsa/202310-09
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:36:12Z/ Found at https://security.gentoo.org/glsa/202310-09
Exploit Prediction Scoring System (EPSS)
Percentile 0.2193
EPSS Score 0.0007
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:29:08.967738+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/c-ares/CVE-2023-31124.yml 37.0.0