Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40975 β€” AI Deep Analysis Summary

CVSS 4.8 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Vulnerability Essence**: Using `${random.value}`, `${random.int}`, `${random.long}` to generate **keys**. ⚠️ **Consequence**: Keys are predictable β†’ **risk of leakage**.…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: - Use of **weak pseudo-random number generator** (weak PRNG). - Injected via **random value property source**. - ❌ `${random.value}` / `${random.int}` / `${random.long}` are unsuitable for keys.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: - Spring Boot **4.0.0–4.0.5** (fixed in 4.0.6) - **3.5.0–3.5.13** (fixed in 3.5.14) - **3.4.0–3.4.15** (fixed in 3.4.16) - **3.3.0–3.3.18** (fixed in 3.3.19) - **2.7.0–2.7.32** (fixed i…

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Capabilities**: - No special privileges required πŸšͺ❌. - Can **predict keys** β†’ access sensitive data πŸ—οΈβž‘οΈπŸ“‚. - May impersonate legitimate users or decrypt communications πŸ”“.

Q5Is exploitation threshold high? (Auth/Config)

🎯 **Exploitation Threshold**: - **Low** βœ…! - 🚫 No authentication needed. - Only requires the application to use weak random values as keys πŸ§ͺ.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”¬ **Existing Exploit**: - ❌ No PoC available πŸ“­. - ❌ No in-the-wild exploitation reports πŸ“‰. - But the principle is simple ➑️ easy to construct an attack 🧩.

Q7How to self-check? (Features/Scanning)

🧰 **Self-Check Method**: - πŸ”Ž Check configuration files/code for use of: - `${random.value}` - `${random.int}` - `${random.long}` to generate keys πŸ—οΈ.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: - βœ… Fixed versions released: - 4.0.6, 3.5.14, 3.4.16, 3.3.19, 2.7.33 🎯. - πŸ“’ Announcement at [spring.io/security/cve-2026-40975](https://spring.io/security/cve-2026-40975).

Q9What if no patch? (Workaround)

⏳ **When No Patch Available**: - 🚫 Disable `${random.value}` / `${random.int}` / `${random.long}` for key generation. - πŸ’‘ Switch to `${random.uuid}` or system secure random API πŸ”.…

Q10Is it urgent? (Priority Suggestion)

⏰ **Priority**: - 🟠 **Medium~High**! - CVSS: **Low/Impact** πŸ”». - Easy to exploit + risk of key leakage 🚨. - Recommend **immediate investigation & upgrade** πŸš€.