Skip to main content

CVE-2025-40912: CWE-1395 Dependency on Vulnerable Third-Party Component in MIK CryptX

Critical
VulnerabilityCVE-2025-40912cvecve-2025-40912cwe-1395
Published: Wed Jun 11 2025 (06/11/2025, 17:48:39 UTC)
Source: CVE Database V5
Vendor/Project: MIK
Product: CryptX

Description

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

AI-Powered Analysis

AILast updated: 07/12/2025, 09:31:25 UTC

Technical Analysis

CVE-2025-40912 is a critical vulnerability affecting the CryptX Perl module versions prior to 0.065. CryptX is a cryptographic library for Perl that embeds the tomcrypt library to provide cryptographic functions. The vulnerability arises due to a dependency on an outdated version of the tomcrypt library, which is susceptible to malformed Unicode input, as previously identified in CVE-2019-17362. Specifically, the vulnerability is categorized under CWE-1395, which relates to dependencies on vulnerable third-party components. The affected versions of CryptX (notably version 0.002) include this vulnerable tomcrypt library, exposing applications using these versions to potential exploitation. The CVSS v3.1 base score of 9.8 indicates a critical severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without authentication or user action, potentially leading to full compromise of systems relying on CryptX for cryptographic operations. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat. The root cause is the reliance on a vulnerable third-party cryptographic library, highlighting the risks of supply chain and dependency management in software development.

Potential Impact

For European organizations, the impact of CVE-2025-40912 can be severe, especially those relying on Perl applications that use CryptX for cryptographic functions such as encryption, decryption, digital signatures, or secure communications. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, undermining the confidentiality, integrity, and availability of sensitive information and critical systems. This is particularly concerning for sectors with stringent data protection requirements under GDPR, such as finance, healthcare, and government agencies. Compromise of cryptographic modules can also erode trust in secure communications and digital identities, potentially affecting compliance and regulatory standing. Additionally, since the vulnerability can be exploited remotely without authentication, it increases the attack surface and risk of widespread exploitation if not promptly mitigated.

Mitigation Recommendations

European organizations should immediately audit their Perl environments to identify any usage of CryptX versions prior to 0.065. Upgrading CryptX to version 0.065 or later, which includes the patched tomcrypt library, is the primary mitigation step. If upgrading is not immediately feasible, organizations should consider isolating affected systems from untrusted networks to reduce exposure. Additionally, implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous traffic patterns targeting cryptographic services can help. Organizations should also review their software supply chain and dependency management practices to ensure timely updates of third-party components. Monitoring for any emerging exploit activity related to this CVE is recommended. Finally, conducting thorough security testing and code reviews of cryptographic implementations can help identify and remediate similar dependency risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CPANSec
Date Reserved
2025-04-16T09:05:34.361Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6849c32c527d26c5b90ccd26

Added to database: 6/11/2025, 5:55:56 PM

Last enriched: 7/12/2025, 9:31:25 AM

Last updated: 8/14/2025, 7:36:45 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats