Random Number Generation Issue in Net::EasyTCP for Perl by MNAGUIB
CVE-2024-56830

5.4MEDIUM

Key Information:

Vendor
MNAGUIB
Vendor
CVE Published:
2 January 2025

Summary

The Net::EasyTCP package for Perl, specifically versions 0.15 through 0.26, incorporates a security issue related to the use of Perl's built-in rand() function for random number generation in the absence of a strong randomization module. This reliance on weak randomization can result in predictable outputs, thereby exposing applications that utilize this package to a range of potential security threats, including reliance on compromised or predictable session tokens.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.