Client Nonce Insecurities in Authen::SASL::Perl::DIGEST_MD5 by Authen
CVE-2025-40918

6.5MEDIUM

Key Information:

Vendor

Ehuels

Vendor
CVE Published:
16 July 2025

What is CVE-2025-40918?

The Authen::SASL::Perl::DIGEST_MD5 module for Perl exhibits a vulnerability related to the insecure generation of the client nonce (cnonce). This nonce is derived from a combination of the process ID (PID), the current epoch time, and the insecure built-in rand function. The PID is limited to a small range, which may be exploited, coupled with the potential for the epoch time to be guessed if it is not disclosed via the HTTP Date header. According to RFC 2831, a secure implementation of the cnonce should contain at least 64 bits of entropy to defend against chosen plaintext attacks and ensure mutual authentication, highlighting the importance of strengthening the nonce generation process. Users of affected versions are urged to apply a security patch to mitigate this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Authen::SASL::Perl::DIGEST_MD5 2.04 <= 2.1800

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.