Cryptographic Weakness in Perl Crypt::Random Package by Perl
CVE-2025-1828

8.8HIGH

Key Information:

Vendor
Perl
Vendor
CVE Published:
11 March 2025

Summary

The Crypt::Random Perl package versions 1.05 to 1.55 may utilize the rand() function, which lacks cryptographic strength for secure operations. In the absence of a specified Provider, and where /dev/urandom or an Entropy Gathering Daemon (EGD) service is unavailable, the package defaults to an insecure random number generation method. This vulnerability is particularly relevant for users on Windows systems running Perl, where the insecure option may be employed by default. It is critical to ensure that secure randomness sources are utilized to prevent potential exploitation.

Affected Version(s)

Crypt::Random 1.05 < 1.56

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Robert Rothenberg (RRWO)
.