Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys.
Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object.
Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys. Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object. Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography. | |
| Title | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys | |
| Weaknesses | CWE-338 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-11T21:29:37.446Z
Reserved: 2026-04-12T17:24:50.568Z
Link: CVE-2026-6146
No data.
Status : Received
Published: 2026-05-11T20:25:47.597
Modified: 2026-05-11T22:22:14.653
Link: CVE-2026-6146
No data.
OpenCVE Enrichment
Updated: 2026-05-11T21:15:46Z