
Cloud Vulnerability DB
A community-led vulnerabilities database
Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function (CVE Details).
The vulnerability stems from the use of Perl's built-in rand() function as a fallback mechanism for generating random numbers when /dev/urandom is not accessible. The rand() function is not cryptographically secure as it is seeded by only 32-bits (4 bytes), and its output can be predicted easily. The issue has been assigned a CVSS v3.1 Base Score of 4.0 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Red Hat XML, CVE Details).
The use of a weak random number generator can lead to predictable cryptographic values, potentially compromising the security of encrypted data. This is particularly concerning in environments where /dev/urandom is not available, as the fallback to rand() significantly reduces the entropy of the generated values, making them potentially predictable to attackers (Perl Random Docs).
Currently, mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability (Red Hat XML). Users are advised to ensure their systems have access to /dev/urandom or consider using alternative cryptographic libraries that implement secure random number generation.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."