{"id":"CVE-2016-10743","details":"hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.","modified":"2026-03-12T22:11:53.383215Z","published":"2019-03-23T19:29:00.210Z","references":[{"type":"WEB","url":"https://usn.ubuntu.com/3944-1/"},{"type":"WEB","url":"http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2020/Feb/26"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/02/27/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/02/27/2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00035.html"},{"type":"FIX","url":"https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10743.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2.6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}