Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-2814

Опубликовано: 13 апр. 2025
Источник: nvd
CVSS3: 4
EPSS Низкий

Описание

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

EPSS

Процентиль: 2%
0.00015
Низкий

4 Medium

CVSS3

Дефекты

CWE-338
CWE-338

Связанные уязвимости

CVSS3: 4
ubuntu
5 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVSS3: 4.8
redhat
5 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVSS3: 4
debian
5 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() ...

redos
3 месяца назад

Уязвимость perl-Crypt-CBC

CVSS3: 4
github
5 месяцев назад

Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

EPSS

Процентиль: 2%
0.00015
Низкий

4 Medium

CVSS3

Дефекты

CWE-338
CWE-338