CVE-2025-40912: CWE-1395 Dependency on Vulnerable Third-Party Component in MIK CryptX
CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.
AI Analysis
Technical Summary
CVE-2025-40912 is a critical vulnerability affecting the CryptX Perl module versions prior to 0.065. CryptX is a cryptographic library for Perl that embeds the tomcrypt library to provide cryptographic functions. The vulnerability arises due to a dependency on an outdated version of the tomcrypt library, which is susceptible to malformed Unicode input, as previously identified in CVE-2019-17362. Specifically, the vulnerability is categorized under CWE-1395, which relates to dependencies on vulnerable third-party components. The affected versions of CryptX (notably version 0.002) include this vulnerable tomcrypt library, exposing applications using these versions to potential exploitation. The CVSS v3.1 base score of 9.8 indicates a critical severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without authentication or user action, potentially leading to full compromise of systems relying on CryptX for cryptographic operations. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat. The root cause is the reliance on a vulnerable third-party cryptographic library, highlighting the risks of supply chain and dependency management in software development.
Potential Impact
For European organizations, the impact of CVE-2025-40912 can be severe, especially those relying on Perl applications that use CryptX for cryptographic functions such as encryption, decryption, digital signatures, or secure communications. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, undermining the confidentiality, integrity, and availability of sensitive information and critical systems. This is particularly concerning for sectors with stringent data protection requirements under GDPR, such as finance, healthcare, and government agencies. Compromise of cryptographic modules can also erode trust in secure communications and digital identities, potentially affecting compliance and regulatory standing. Additionally, since the vulnerability can be exploited remotely without authentication, it increases the attack surface and risk of widespread exploitation if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately audit their Perl environments to identify any usage of CryptX versions prior to 0.065. Upgrading CryptX to version 0.065 or later, which includes the patched tomcrypt library, is the primary mitigation step. If upgrading is not immediately feasible, organizations should consider isolating affected systems from untrusted networks to reduce exposure. Additionally, implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous traffic patterns targeting cryptographic services can help. Organizations should also review their software supply chain and dependency management practices to ensure timely updates of third-party components. Monitoring for any emerging exploit activity related to this CVE is recommended. Finally, conducting thorough security testing and code reviews of cryptographic implementations can help identify and remediate similar dependency risks proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-40912: CWE-1395 Dependency on Vulnerable Third-Party Component in MIK CryptX
Description
CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.
AI-Powered Analysis
Technical Analysis
CVE-2025-40912 is a critical vulnerability affecting the CryptX Perl module versions prior to 0.065. CryptX is a cryptographic library for Perl that embeds the tomcrypt library to provide cryptographic functions. The vulnerability arises due to a dependency on an outdated version of the tomcrypt library, which is susceptible to malformed Unicode input, as previously identified in CVE-2019-17362. Specifically, the vulnerability is categorized under CWE-1395, which relates to dependencies on vulnerable third-party components. The affected versions of CryptX (notably version 0.002) include this vulnerable tomcrypt library, exposing applications using these versions to potential exploitation. The CVSS v3.1 base score of 9.8 indicates a critical severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without authentication or user action, potentially leading to full compromise of systems relying on CryptX for cryptographic operations. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat. The root cause is the reliance on a vulnerable third-party cryptographic library, highlighting the risks of supply chain and dependency management in software development.
Potential Impact
For European organizations, the impact of CVE-2025-40912 can be severe, especially those relying on Perl applications that use CryptX for cryptographic functions such as encryption, decryption, digital signatures, or secure communications. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, undermining the confidentiality, integrity, and availability of sensitive information and critical systems. This is particularly concerning for sectors with stringent data protection requirements under GDPR, such as finance, healthcare, and government agencies. Compromise of cryptographic modules can also erode trust in secure communications and digital identities, potentially affecting compliance and regulatory standing. Additionally, since the vulnerability can be exploited remotely without authentication, it increases the attack surface and risk of widespread exploitation if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately audit their Perl environments to identify any usage of CryptX versions prior to 0.065. Upgrading CryptX to version 0.065 or later, which includes the patched tomcrypt library, is the primary mitigation step. If upgrading is not immediately feasible, organizations should consider isolating affected systems from untrusted networks to reduce exposure. Additionally, implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous traffic patterns targeting cryptographic services can help. Organizations should also review their software supply chain and dependency management practices to ensure timely updates of third-party components. Monitoring for any emerging exploit activity related to this CVE is recommended. Finally, conducting thorough security testing and code reviews of cryptographic implementations can help identify and remediate similar dependency risks proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CPANSec
- Date Reserved
- 2025-04-16T09:05:34.361Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6849c32c527d26c5b90ccd26
Added to database: 6/11/2025, 5:55:56 PM
Last enriched: 7/12/2025, 9:31:25 AM
Last updated: 8/14/2025, 7:36:45 PM
Views: 39
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.