Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys.
Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object.
Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bigfoot
Bigfoot amazon::credentials |
|
| Vendors & Products |
Bigfoot
Bigfoot amazon::credentials |
Mon, 11 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys. Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object. Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography. | |
| Title | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys | |
| Weaknesses | CWE-338 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published: 2026-05-11T19:12:17.630Z
Updated: 2026-05-11T21:29:37.446Z
Reserved: 2026-04-12T17:24:50.568Z
Link: CVE-2026-6146
No data.
Status : Deferred
Published: 2026-05-11T20:25:47.597
Modified: 2026-05-12T16:48:58.260
Link: CVE-2026-6146
No data.
ReportizFlow