Insecure Client Nonce Generation in Authen::DigestMD5 for Perl
CVE-2025-40919

6.5MEDIUM

Key Information:

Vendor

Salva

Vendor
CVE Published:
16 July 2025

What is CVE-2025-40919?

Authen::DigestMD5 for Perl vulnerabilities arise from the insecure generation of client nonce (cnonce) values in versions 0.01 and 0.02. It employs an MD5 hash constructed from the process ID (PID), the current epoch time, and the built-in rand function. This methodology is flawed as the PID originates from a limited set of values, and the epoch time can often be anticipated, especially if shared in HTTP headers. Furthermore, the rand function lacks cryptographic security, making the nonce susceptible to attacks that could compromise user authentication and data integrity. According to RFC 2831, a secure cnonce should contain a minimum of 64 bits of entropy, which this implementation does not achieve.

Affected Version(s)

Authen::DigestMD5 0.01 <= 0.04

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-40919 : Insecure Client Nonce Generation in Authen::DigestMD5 for Perl