CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

34 CVEs Avg CVSS 7.9 MITRE
16
CRITICAL
9
HIGH
8
MEDIUM
1
LOW
3
POC
0
KEV

Monthly

CVE-2026-34871 MEDIUM This Month

Mbed TLS 3.x before 3.6.6, 4.x before 4.1.0, and TF-PSA-Crypto before 1.1.0 contain a predictable seed vulnerability in their pseudo-random number generator (PRNG) implementation that compromises the cryptographic strength of generated random values. Attackers with knowledge of the seed initialization mechanism can predict PRNG output, enabling them to forge cryptographic material, decrypt communications, or impersonate legitimate parties. No active exploitation has been confirmed, but the information disclosure nature of this vulnerability affects all applications relying on these libraries for cryptographic operations.

Information Disclosure
NVD VulDB
CVSS 3.1
6.7
EPSS
0.0%
CVE-2026-25726 HIGH PATCH GHSA This Week

Weak pseudo-random number generation in Cloudreve enables JWT forgery and complete account takeover on instances initialized before v4.10.0. Attackers can brute-force the PRNG seed (achievable in under 3 hours on consumer hardware) by obtaining administrator creation timestamps via public APIs and validating against known hashids, then forge valid JWTs for any user including administrators. No public exploit confirmed at time of analysis, though detailed attack methodology is disclosed. CVSS 8.1 (High) reflects network-accessible privilege escalation despite high attack complexity requiring cryptographic brute-forcing.

Privilege Escalation OpenSSL
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-5087 HIGH This Week

PAGI::Middleware::Session::Store::Cookie through version 0.001003 generates cryptographically weak initialization vectors (IVs) for session cookie encryption by falling back to Perl's built-in rand() function when /dev/urandom is unavailable, particularly affecting Windows systems. This predictable IV generation enables attackers to decrypt and tamper with session data stored in cookies, compromising session confidentiality and integrity. No active exploitation has been confirmed, but the vulnerability affects all deployments on systems lacking /dev/urandom access.

Information Disclosure Microsoft
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-15618 CRITICAL Act Now

Business::OnlinePayment::StoredTransaction through version 0.01 uses cryptographically weak secret key generation based on MD5 hashing of a single rand() call, exposing encrypted credit card transaction data to key recovery attacks. The vulnerability affects Perl module users who rely on this library for payment processing, allowing attackers to potentially decrypt stored transaction records. No CVSS score was assigned, but the direct compromise of payment card encryption represents critical risk to financial data confidentiality.

Information Disclosure
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2024-57854 CRITICAL PATCH Act Now

Weak PRNG in Net::NSCA::Client through 0.009002 for Perl. Patch available.

Information Disclosure
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-40931 CRITICAL Act Now

Insecure session ID generation in Apache::Session::Generate::MD5 through 1.94 for Perl.

Apache Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-40926 CRITICAL PATCH Act Now

Insecure session ID generation in Plack::Middleware::Session::Simple before 0.05 for Perl. Patch available.

Information Disclosure Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-3255 MEDIUM PATCH This Month

HTTP::Session2 before version 1.12 for Perl generates predictable session identifiers on Windows systems when /dev/urandom is unavailable, falling back to weak randomization using rand() combined with guessable values like PID and epoch time. An attacker could predict valid session IDs to hijack user sessions, as SHA-1 hashing of these weak inputs provides insufficient cryptographic protection. This affects Perl applications using HTTP::Session2 on Windows platforms where secure random sources are not accessible.

Windows
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-40932 HIGH This Week

Apache\ versions up to \ contains a vulnerability that allows attackers to gain access to systems (CVSS 8.2).

Apache Suse
NVD
CVSS 3.1
8.2
EPSS
0.0%
CVE-2024-58041 CRITICAL Act Now

Insecure random number generation in Smolder 1.51 Perl testing framework. Uses rand() for cryptographic operations instead of a CSPRNG, enabling prediction of security tokens.

Information Disclosure Smolder
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-34871
EPSS 0% CVSS 6.7
MEDIUM This Month

Mbed TLS 3.x before 3.6.6, 4.x before 4.1.0, and TF-PSA-Crypto before 1.1.0 contain a predictable seed vulnerability in their pseudo-random number generator (PRNG) implementation that compromises the cryptographic strength of generated random values. Attackers with knowledge of the seed initialization mechanism can predict PRNG output, enabling them to forge cryptographic material, decrypt communications, or impersonate legitimate parties. No active exploitation has been confirmed, but the information disclosure nature of this vulnerability affects all applications relying on these libraries for cryptographic operations.

Information Disclosure
NVD VulDB
CVE-2026-25726
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Weak pseudo-random number generation in Cloudreve enables JWT forgery and complete account takeover on instances initialized before v4.10.0. Attackers can brute-force the PRNG seed (achievable in under 3 hours on consumer hardware) by obtaining administrator creation timestamps via public APIs and validating against known hashids, then forge valid JWTs for any user including administrators. No public exploit confirmed at time of analysis, though detailed attack methodology is disclosed. CVSS 8.1 (High) reflects network-accessible privilege escalation despite high attack complexity requiring cryptographic brute-forcing.

Privilege Escalation OpenSSL
NVD GitHub
CVE-2026-5087
EPSS 0% CVSS 7.5
HIGH This Week

PAGI::Middleware::Session::Store::Cookie through version 0.001003 generates cryptographically weak initialization vectors (IVs) for session cookie encryption by falling back to Perl's built-in rand() function when /dev/urandom is unavailable, particularly affecting Windows systems. This predictable IV generation enables attackers to decrypt and tamper with session data stored in cookies, compromising session confidentiality and integrity. No active exploitation has been confirmed, but the vulnerability affects all deployments on systems lacking /dev/urandom access.

Information Disclosure Microsoft
NVD VulDB
CVE-2025-15618
EPSS 0% CVSS 9.1
CRITICAL Act Now

Business::OnlinePayment::StoredTransaction through version 0.01 uses cryptographically weak secret key generation based on MD5 hashing of a single rand() call, exposing encrypted credit card transaction data to key recovery attacks. The vulnerability affects Perl module users who rely on this library for payment processing, allowing attackers to potentially decrypt stored transaction records. No CVSS score was assigned, but the direct compromise of payment card encryption represents critical risk to financial data confidentiality.

Information Disclosure
NVD
CVE-2024-57854
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Weak PRNG in Net::NSCA::Client through 0.009002 for Perl. Patch available.

Information Disclosure
NVD
CVE-2025-40931
EPSS 0% CVSS 9.1
CRITICAL Act Now

Insecure session ID generation in Apache::Session::Generate::MD5 through 1.94 for Perl.

Apache Suse
NVD GitHub
CVE-2025-40926
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Insecure session ID generation in Plack::Middleware::Session::Simple before 0.05 for Perl. Patch available.

Information Disclosure Suse
NVD GitHub
CVE-2026-3255
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

HTTP::Session2 before version 1.12 for Perl generates predictable session identifiers on Windows systems when /dev/urandom is unavailable, falling back to weak randomization using rand() combined with guessable values like PID and epoch time. An attacker could predict valid session IDs to hijack user sessions, as SHA-1 hashing of these weak inputs provides insufficient cryptographic protection. This affects Perl applications using HTTP::Session2 on Windows platforms where secure random sources are not accessible.

Windows
NVD GitHub
CVE-2025-40932
EPSS 0% CVSS 8.2
HIGH This Week

Apache\ versions up to \ contains a vulnerability that allows attackers to gain access to systems (CVSS 8.2).

Apache Suse
NVD
CVE-2024-58041
EPSS 0% CVSS 9.1
CRITICAL Act Now

Insecure random number generation in Smolder 1.51 Perl testing framework. Uses rand() for cryptographic operations instead of a CSPRNG, enabling prediction of security tokens.

Information Disclosure Smolder
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy