CVE-2024-36048: n/a
QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1 uses only the time to seed the PRNG, which may result in guessable values.
AI Analysis
Technical Summary
CVE-2024-36048 is a critical security vulnerability found in the QAbstractOAuth class within the Qt Network Authorization module. Qt is a widely used cross-platform application framework, and its OAuth implementation is critical for secure authorization flows in many applications. The vulnerability stems from the use of a pseudorandom number generator (PRNG) seeded solely with the current system time. Since time-based seeds are predictable, an attacker can potentially guess the PRNG output values, which are used to generate OAuth tokens or authorization codes. This predictability undermines the security guarantees of OAuth, allowing attackers to impersonate legitimate users or services, intercept sensitive data, or perform unauthorized actions. The affected Qt versions include all releases before 5.15.17, all 6.x versions before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network, increasing the attack surface. The CVSS v3.1 base score of 9.8 indicates critical severity, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature suggests that exploitation could lead to full compromise of OAuth-protected resources. The root cause is classified under CWE-335 (Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)). Remediation involves updating to fixed Qt versions where the PRNG seeding is improved to use more secure entropy sources, reducing predictability. Organizations should also review their OAuth implementations for additional security controls and monitor for suspicious authorization activities.
Potential Impact
The impact of CVE-2024-36048 on European organizations can be severe, particularly for those relying on Qt-based applications for secure OAuth authorization. Exploitation could allow attackers to predict OAuth tokens, leading to unauthorized access to sensitive systems and data, compromising confidentiality. Integrity could be undermined by allowing attackers to perform unauthorized actions or modify data. Availability may also be affected if attackers disrupt OAuth flows or cause denial of service through repeated unauthorized attempts. Sectors such as finance, healthcare, telecommunications, and critical infrastructure, which often use OAuth for secure access control, are at heightened risk. The vulnerability's remote exploitability without authentication or user interaction increases the likelihood of attacks. Additionally, organizations developing software with Qt or providing services that depend on Qt OAuth components may face reputational damage and regulatory penalties if breaches occur. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately update Qt to the patched versions: 5.15.17 or later, 6.2.13 or later, 6.5.6 or later, and 6.7.1 or later, depending on the version in use. 2. Audit all applications using Qt's QAbstractOAuth for OAuth token generation and ensure they are not relying on vulnerable versions. 3. Implement additional entropy sources for PRNG seeding if custom OAuth implementations exist. 4. Employ multi-factor authentication (MFA) to reduce the impact of compromised tokens. 5. Monitor OAuth authorization logs for unusual or repeated token requests that may indicate exploitation attempts. 6. Conduct penetration testing focused on OAuth flows to detect weaknesses. 7. Educate developers about secure PRNG usage and OAuth best practices. 8. Consider using hardware security modules (HSMs) or secure enclaves for token generation where feasible. 9. Coordinate with Qt maintainers and security teams to stay informed about updates and advisories. 10. For critical systems, implement network segmentation and strict access controls to limit exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-36048: n/a
Description
QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1 uses only the time to seed the PRNG, which may result in guessable values.
AI-Powered Analysis
Technical Analysis
CVE-2024-36048 is a critical security vulnerability found in the QAbstractOAuth class within the Qt Network Authorization module. Qt is a widely used cross-platform application framework, and its OAuth implementation is critical for secure authorization flows in many applications. The vulnerability stems from the use of a pseudorandom number generator (PRNG) seeded solely with the current system time. Since time-based seeds are predictable, an attacker can potentially guess the PRNG output values, which are used to generate OAuth tokens or authorization codes. This predictability undermines the security guarantees of OAuth, allowing attackers to impersonate legitimate users or services, intercept sensitive data, or perform unauthorized actions. The affected Qt versions include all releases before 5.15.17, all 6.x versions before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network, increasing the attack surface. The CVSS v3.1 base score of 9.8 indicates critical severity, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature suggests that exploitation could lead to full compromise of OAuth-protected resources. The root cause is classified under CWE-335 (Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)). Remediation involves updating to fixed Qt versions where the PRNG seeding is improved to use more secure entropy sources, reducing predictability. Organizations should also review their OAuth implementations for additional security controls and monitor for suspicious authorization activities.
Potential Impact
The impact of CVE-2024-36048 on European organizations can be severe, particularly for those relying on Qt-based applications for secure OAuth authorization. Exploitation could allow attackers to predict OAuth tokens, leading to unauthorized access to sensitive systems and data, compromising confidentiality. Integrity could be undermined by allowing attackers to perform unauthorized actions or modify data. Availability may also be affected if attackers disrupt OAuth flows or cause denial of service through repeated unauthorized attempts. Sectors such as finance, healthcare, telecommunications, and critical infrastructure, which often use OAuth for secure access control, are at heightened risk. The vulnerability's remote exploitability without authentication or user interaction increases the likelihood of attacks. Additionally, organizations developing software with Qt or providing services that depend on Qt OAuth components may face reputational damage and regulatory penalties if breaches occur. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately update Qt to the patched versions: 5.15.17 or later, 6.2.13 or later, 6.5.6 or later, and 6.7.1 or later, depending on the version in use. 2. Audit all applications using Qt's QAbstractOAuth for OAuth token generation and ensure they are not relying on vulnerable versions. 3. Implement additional entropy sources for PRNG seeding if custom OAuth implementations exist. 4. Employ multi-factor authentication (MFA) to reduce the impact of compromised tokens. 5. Monitor OAuth authorization logs for unusual or repeated token requests that may indicate exploitation attempts. 6. Conduct penetration testing focused on OAuth flows to detect weaknesses. 7. Educate developers about secure PRNG usage and OAuth best practices. 8. Consider using hardware security modules (HSMs) or secure enclaves for token generation where feasible. 9. Coordinate with Qt maintainers and security teams to stay informed about updates and advisories. 10. For critical systems, implement network segmentation and strict access controls to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b50ff58c9332ff073ec
Added to database: 11/4/2025, 5:43:44 PM
Last enriched: 11/4/2025, 5:57:05 PM
Last updated: 11/5/2025, 10:50:12 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12192: CWE-697 Incorrect Comparison in stellarwp The Events Calendar
MediumCVE-2025-11987: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in brechtvds Visual Link Preview
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.