Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts.

The built-in rand function is predictable, and unsuitable for cryptography.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 08 May 2026 20:30:00 +0000

Type Values Removed Values Added
References

Fri, 08 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts. The built-in rand function is predictable, and unsuitable for cryptography.
Title Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-08T19:30:59.696Z

Reserved: 2026-04-20T08:24:35.812Z

Link: CVE-2026-6659

cve-icon Vulnrichment

Updated: 2026-05-08T19:30:59.696Z

cve-icon NVD

Status : Received

Published: 2026-05-08T18:16:34.183

Modified: 2026-05-08T20:16:32.063

Link: CVE-2026-6659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T19:45:15Z

Weaknesses