Vulnerability Description
Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl truncates passwords with embedded NULLs. Password parameters in PKCS12.xs are declared char *, which routes through Perl's default typemap to SvPV_nolen. The Perl length is discarded. The C code (or OpenSSL internally) calls strlen() on the buffer. Any password byte at or after the first NULL is silently dropped. Binary / KDF-derived / HMAC-derived passwords lose entropy without any warnings.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://metacpan.org/release/JONASBN/Crypt-OpenSSL-PKCS12-1.95/view/Changes.md
- http://www.openwall.com/lists/oss-security/2026/05/17/6
FAQ
What is CVE-2026-8721?
CVE-2026-8721 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl truncates passwords with embedded NULLs. Password parameters in PKCS12.xs are declared char *, which routes through Perl's default typemap to SvP...
How severe is CVE-2026-8721?
CVE-2026-8721 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-8721?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.