CVE-2025-1828 – Crypt::Random Perl package Cryptographically Weak Random Number Generation

The following table lists the changes that have been made to the
CVE-2025-1828 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 9b29abf9-4ab0-4765-b253-1875cd9b441e

    Mar. 11, 2025

    Action Type Old Value New Value
    Added Description Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.

    Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.

    In particular, Windows versions of perl will encounter this issue by default.

    Added CWE CWE-338
    Added Reference https://github.com/perl-Crypt-OpenPGP/Crypt-Random/commit/1f8b29e9e89d8d083fd025152e76ec918136cc05
    Added Reference https://github.com/perl-Crypt-OpenPGP/Crypt-Random/pull/1
    Added Reference https://perldoc.perl.org/functions/rand
Share the Post:

Related Posts