CVE-2024-57854: Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator
Timothy Legge 05 Mar 2026 02:20 UTC
========================================================================
CVE-2024-57854 CPAN Security Group
========================================================================
CVE ID: CVE-2024-57854
Distribution: Net-NSCA-Client
Versions: through 0.009002
MetaCPAN: https://metacpan.org/dist/Net-NSCA-Client
VCS Repo: https://github.com/dougwilson/perl5-net-nsca-client
Net::NSCA::Client versions through 0.009002 for Perl uses a poor random
number generator
Description
-----------
Net::NSCA::Client versions through 0.009002 for Perl uses a poor random
number generator.
Version v0.003 switched to use Data::Rand::Obscure instead of
Crypt::Random for generation of a random initialisation vectors.
Data::Rand::Obscure uses Perl's built-in rand() function, which is not
suitable for cryptographic functions.
Problem types
-------------
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
(PRNG)
Solutions
---------
Apply a manual patch or migrate to a different solution
References
----------
https://metacpan.org/release/DOUGDUDE/Net-NSCA-Client-0.009002/source/lib/Net/NSCA/Client/InitialPacket.pm#L119
https://patch-diff.githubusercontent.com/raw/dougwilson/perl5-net-nsca-client/pull/2.patch
Credits
-------
Robert Rothenberg, finder