CVE-2025-1805

5.3 MEDIUM

📋 TL;DR

CVE-2025-1805 is a cryptographic vulnerability in Crypt::Salt for Perl version 0.01 where the insecure rand() function is used to generate salts for cryptographic operations. This allows attackers to potentially predict or brute-force cryptographic salts, weakening security mechanisms that rely on them. Any Perl application using Crypt::Salt 0.01 for cryptographic salt generation is affected.

💻 Affected Systems

Products:
  • Crypt::Salt for Perl
Versions: 0.01 only
Operating Systems: All operating systems running Perl
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Crypt::Salt 0.01 module. The vulnerability exists in the default salt generation method.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could predict cryptographic salts, enabling them to brute-force hashed passwords, decrypt sensitive data, or bypass authentication mechanisms that rely on salted cryptographic operations.

🟠

Likely Case

Reduced cryptographic strength leading to easier brute-force attacks against hashed passwords or encrypted data, particularly in systems with weak password policies.

🟢

If Mitigated

Limited impact if strong additional security controls exist, but cryptographic operations remain weaker than intended.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the cryptographic implementation and access to hashed/encrypted data. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Remove Crypt::Salt 0.01 from your Perl installation
2. Replace with a secure cryptographic library like Crypt::Random or use Perl's built-in secure random functions
3. Regenerate any cryptographic salts that were created with the vulnerable version

🔧 Temporary Workarounds

Replace with secure random function

all

Modify code to use Perl's secure random functions instead of Crypt::Salt

# Replace: use Crypt::Salt;
# With: use Crypt::Random qw(random_bytes);
# Or use: use Math::Random::Secure qw(rand);

🧯 If You Can't Patch

  • Implement additional security layers like multi-factor authentication
  • Enforce strong password policies and regular password rotation

🔍 How to Verify

Check if Vulnerable:

Check if Crypt::Salt version 0.01 is installed: perl -MCrypt::Salt -e 'print $Crypt::Salt::VERSION'

Check Version:

perl -MCrypt::Salt -e 'print $Crypt::Salt::VERSION'

Verify Fix Applied:

Verify Crypt::Salt 0.01 is not installed and check that secure random functions are being used

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Increased failed login attempts

Network Indicators:

  • None specific to this vulnerability

SIEM Query:

Search for processes loading Crypt::Salt module or Perl scripts using insecure random functions

🔗 References

📤 Share & Export