Cryptographic Weakness in Perl Crypt::Random Package by Perl
CVE-2025-1828
8.8HIGH
Summary
The Crypt::Random Perl package versions 1.05 to 1.55 may utilize the rand() function, which lacks cryptographic strength for secure operations. In the absence of a specified Provider, and where /dev/urandom or an Entropy Gathering Daemon (EGD) service is unavailable, the package defaults to an insecure random number generation method. This vulnerability is particularly relevant for users on Windows systems running Perl, where the insecure option may be employed by default. It is critical to ensure that secure randomness sources are utilized to prevent potential exploitation.
Affected Version(s)
Crypt::Random 1.05 < 1.56
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Robert Rothenberg (RRWO)