It was discovered that ntopng did not properly seed its random number generator, leading to predictable session tokens. An attacker could use this vulnerability to hijack a user's session.
{ "binaries": [ { "binary_name": "ntopng", "binary_version": "2.2+dfsg1-1ubuntu0.1~esm2" }, { "binary_name": "ntopng-data", "binary_version": "2.2+dfsg1-1ubuntu0.1~esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "ntopng", "binary_version": "3.2+dfsg1-1ubuntu0.1~esm2" }, { "binary_name": "ntopng-data", "binary_version": "3.2+dfsg1-1ubuntu0.1~esm2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }