Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.
Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.
In particular, Windows versions of perl will encounter this issue by default.
CVE ID: CVE-2025-1828
Vendor: perl
Product: Crypt::Random
EPSS Score: 0.05% (probability of being exploited)
EPSS Percentile: 11.49% (scored less or equal to compared to others)
EPSS Date: 2025-04-08 (when was this score calculated)