The following table lists the changes that have been made to the
CVE-2025-1828 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 9b29abf9-4ab0-4765-b253-1875cd9b441eMar. 11, 2025
Action Type Old Value New Value Added Description Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.
In particular, Windows versions of perl will encounter this issue by default.
Added CWE CWE-338 Added Reference https://github.com/perl-Crypt-OpenPGP/Crypt-Random/commit/1f8b29e9e89d8d083fd025152e76ec918136cc05 Added Reference https://github.com/perl-Crypt-OpenPGP/Crypt-Random/pull/1 Added Reference https://perldoc.perl.org/functions/rand