CVE-2025-1828

Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider. In particular, Windows versions of perl will encounter this issue by default.
Configurations

Configuration 1 (hide)

cpe:2.3:a:timlegge:crypt\:\:random:*:*:*:*:*:perl:*:*

History

No history.

Information

Published : 2025-03-11 00:15

Updated : 2025-09-29 22:40


NVD link : CVE-2025-1828

Mitre link : CVE-2025-1828

CVE.ORG link : CVE-2025-1828


JSON object : View

Products Affected

timlegge

  • crypt\
CWE
CWE-331

Insufficient Entropy

CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)