CVE-2024-57854

Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator. Version v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors. Data::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dougdude:net\:\:nsca\:\:client:*:*:*:*:*:perl:*:*

History

No history.

Information

Published : 2026-03-05 03:15

Updated : 2026-03-09 14:58


NVD link : CVE-2024-57854

Mitre link : CVE-2024-57854

CVE.ORG link : CVE-2024-57854


JSON object : View

Products Affected

dougdude

  • net\
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)