Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator.

Version v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors.

Data::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Apply a manual patch or migrate to a different solution


Workaround

No workaround given by the vendor.

History

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator. Version v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors. Data::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.
Title Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-05T16:41:19.727Z

Reserved: 2025-03-26T14:00:56.392Z

Link: CVE-2024-57854

cve-icon Vulnrichment

Updated: 2026-03-05T11:12:50.673Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T03:15:53.953

Modified: 2026-03-05T19:38:53.383

Link: CVE-2024-57854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses