CVE-2025-2814
Linux Debian vulnerability analysis and mitigation

Overview

Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function (CVE Details).

Technical details

The vulnerability stems from the use of Perl's built-in rand() function as a fallback mechanism for generating random numbers when /dev/urandom is not accessible. The rand() function is not cryptographically secure as it is seeded by only 32-bits (4 bytes), and its output can be predicted easily. The issue has been assigned a CVSS v3.1 Base Score of 4.0 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Red Hat XML, CVE Details).

Impact

The use of a weak random number generator can lead to predictable cryptographic values, potentially compromising the security of encrypted data. This is particularly concerning in environments where /dev/urandom is not available, as the fallback to rand() significantly reduces the entropy of the generated values, making them potentially predictable to attackers (Perl Random Docs).

Mitigation and workarounds

Currently, mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability (Red Hat XML). Users are advised to ensure their systems have access to /dev/urandom or consider using alternative cryptographic libraries that implement secure random number generation.

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40289N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40288N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40287N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40286N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40285N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management