Home Perl CVE-2025-1828
Back to Perl

CVE-2025-1828

Target: Perl - Crypt::Random

Perl CVSS 8.8 Updated March 10, 2026
Threat Level HIGH

Executive Risk Summary

"The Crypt::Random Perl package versions 1.05 through 1.55 may use the insecure rand() function for cryptographic functions, posing a significant risk to the security of applications relying on this package. This vulnerability is particularly concerning for Windows versions of Perl, which will encounter this issue by default due to the lack of /dev/urandom or an Entropy Gathering Daemon (egd) service."

Operational Audit Arsenal

Target Type library
Target Asset Crypt::Random
Standard Path Perl installations on Windows
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Crypt::Random (library)
$Target = "Crypt::Random"
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Filter $Target -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required not required
Service Disruption

low

Internal Work Notes

Recommend upgrading to a version of Crypt::Random that uses a cryptographically strong random number generator, such as one that utilizes /dev/urandom or an Entropy Gathering Daemon (egd) service, to mitigate this vulnerability.

Intelligence Sources

Scope of Impact

Crypt\ (Version \)

Original NVD Description

"Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider. In particular, Windows versions of perl will encounter this issue by default."

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.