Vulnerability Description
Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider. In particular, Windows versions of perl will encounter this issue by default.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Timlegge | Crypt\ | >= 1.05, <= 1.55, \ |
Related Weaknesses (CWE)
References
- https://github.com/perl-Crypt-OpenPGP/Crypt-Random/commit/1f8b29e9e89d8d083fd025Patch
- https://github.com/perl-Crypt-OpenPGP/Crypt-Random/pull/1Issue TrackingPatch
- https://perldoc.perl.org/functions/randPatch
FAQ
What is CVE-2025-1828?
CVE-2025-1828 is a vulnerability with a CVSS score of 8.8 (HIGH). Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. If the Provider is not specified and /dev/urandom or an Entro...
How severe is CVE-2025-1828?
CVE-2025-1828 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-1828?
Check the references section above for vendor advisories and patch information. Affected products include: Timlegge Crypt\.