CVE-2024-57854 PUBLISHED

Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator

Assigner: CPANSec
Reserved: 26.03.2025 Published: 05.03.2026 Updated: 05.03.2026

Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator.

Version v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors.

Data::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.

Product Status

Vendor DOUGDUDE
Product Net::NSCA::Client
Versions Default: unaffected
  • affected from 0 to 0.009002 (incl.)

Solutions

Apply a manual patch or migrate to a different solution

Credits

  • Robert Rothenberg finder

References

Problem Types

  • CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) CWE