The host is installed with OpenSSL 1.0.2 before 1.0.2a and is prone to a security bypass vulnerability. A flaw is present in the application, which does not ensure that the PRNG is seeded before proceeding with a handshake. Successful exploitation allows remote attacker to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.