Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP

0
High
VulnerabilityCVE-2025-40920cvecve-2025-40920cwe-340cwe-338
Published: Mon Aug 11 2025 (08/11/2025, 20:19:57 UTC)
Source: CVE Database V5
Vendor/Project: ETHER
Product: Catalyst::Authentication::Credential::HTTP

Description

Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562. * The nonces should be generated from a strong cryptographic source, as per RFC 7616.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:48:35 UTC

Technical Analysis

CVE-2025-40920 identifies a cryptographic weakness in the Catalyst::Authentication::Credential::HTTP Perl module, specifically in versions 1.018 and earlier. The module generates nonces for HTTP authentication using the Data::UUID library, which produces version 3 UUIDs. Version 3 UUIDs are generated deterministically from namespace and name inputs, making them predictable and unsuitable for security-sensitive nonce generation. RFC 7616 mandates that nonces used in HTTP Digest Authentication must be generated from strong cryptographic random sources to prevent replay and impersonation attacks. The use of Data::UUID violates this requirement, exposing systems to potential replay attacks where an attacker can reuse or predict nonces to bypass authentication checks. The vulnerability has a CVSS 3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L), indicating it can be exploited remotely without privileges or user interaction, causing high confidentiality impact, limited integrity impact, and low availability impact. Although no exploits are currently known in the wild, the predictable nonce generation represents a significant cryptographic flaw that undermines the security of HTTP authentication mechanisms relying on this module. The vulnerability is tracked under CWE-340 (Generation of Predictable Numbers or Identifiers). No official patches are currently linked, so remediation involves replacing the nonce generation method with a cryptographically secure random number generator compliant with RFC 7616 standards.

Potential Impact

For European organizations, this vulnerability poses a serious risk to web applications and services that utilize Catalyst::Authentication::Credential::HTTP for HTTP authentication. Attackers can exploit predictable nonces to perform replay attacks, potentially gaining unauthorized access to sensitive systems or data. This can lead to confidentiality breaches, unauthorized data exposure, and partial integrity compromise. Critical sectors such as finance, healthcare, government, and telecommunications that rely on Perl-based legacy or custom authentication systems are particularly vulnerable. The ease of remote exploitation without authentication or user interaction increases the threat level. Additionally, organizations failing to update or patch this vulnerability may face compliance issues with GDPR and other data protection regulations due to the risk of unauthorized data access. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of mitigation given the high CVSS score and the fundamental cryptographic weakness.

Mitigation Recommendations

European organizations should immediately audit their use of Catalyst::Authentication::Credential::HTTP to identify affected versions (1.018 and earlier). Since no official patches are currently available, developers should modify the nonce generation logic to use a cryptographically secure random number generator, such as Perl's Crypt::Random or Crypt::URandom modules, ensuring compliance with RFC 7616. Implementing nonces with sufficient entropy and unpredictability is critical. Additionally, organizations should monitor vendor announcements for official patches or updates. Employing web application firewalls (WAFs) to detect and block replay attack patterns can provide interim protection. Regular code reviews and penetration testing focused on authentication mechanisms should be conducted. Finally, organizations should ensure logging and alerting are in place to detect suspicious authentication attempts that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CPANSec
Date Reserved
2025-04-16T09:05:34.362Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689a5384ad5a09ad0028c285

Added to database: 8/11/2025, 8:33:08 PM

Last enriched: 11/4/2025, 9:48:35 PM

Last updated: 11/11/2025, 11:16:20 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats