A Pseudo-Random Number Generator (PRNG) uses seeds incorrectly.
Time of Introduction
Architecture and Design
Technical Impact: Bypass protection
if a PRNG is used incorrectly, such as using the same seed for each
initialization or using a predictable seed, then an attacker may be able
to easily guess the seed and thus the random numbers. This could lead to
unauthorized access to a system if the seed is used for authentication