A Pseudo-Random Number Generator (PRNG) uses seeds incorrectly. 1000 699 Weakness ChildOf 330 888 Category ChildOf 905 Architecture and Design Implementation Access_Control Other Bypass protection mechanism Other if a PRNG is used incorrectly, such as using the same seed for each initialization or using a predictable seed, then an attacker may be able to easily guess the seed and thus the random numbers. This could lead to unauthorized access to a system if the seed is used for authentication and authorization. Michael Howard David LeBlanc John Viega 24 Deadly Sins of Software Security "Sin 20: Weak Random Numbers." Page 299 McGraw-Hill 2010 PRNG Seed Error PLOVER Eric Dalci Cigital 2008-07-01 updated Time_of_Introduction CWE Content Team MITRE 2008-09-08 updated Relationships, Taxonomy_Mappings CWE Content Team MITRE 2011-06-01 updated Common_Consequences CWE Content Team MITRE 2012-05-11 updated Common_Consequences, References, Relationships