CVE-2024-58040

Critical
|9.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to potentially decrypt sensitive information because the encryption relies on a weak random number generator, making it predictable. It affects users of the Crypt::RandomEncryption module in Perl version 0.01, so anyone using this specific version for encryption is at risk.

Technical Description

Crypt::RandomEncryption for Perl version 0.01 uses insecure rand() function during encryption.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade FPatched in 160 days

Quick Information

Published

Sep 30, 2025

6 months ago

Last Modified

Mar 9, 2026

29 days ago

Vendor

qwer

Product

crypt\