


Perceptive Security
SOC/SIEM Consultancy

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, …
Published:
22 April 2026 at 22:00:00
Alert date:
23 April 2026 at 15:02:55
Source:
nvd.nist.gov
Supply Chain & Dependencies, Web Technologies
CVE-2026-41564 affects CryptX versions before 0.088 for Perl, where cryptographic modules fail to reseed PRNG state after forking. The vulnerability causes child processes to share identical PRNG state, leading to predictable randomized operations including key generation. Two ECDSA or DSA signatures from different processes can expose the private signing key through nonce-reuse attacks. This particularly impacts preforking web servers like Starman where crypto objects are inherited by worker processes. The flaw affects multiple cryptographic modules including RSA, DSA, DH, ECC, Ed25519, and X25519 implementations.
Technical details
Mitigation steps:
Affected products:
CryptX
Perl
Starman web server
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41564
https://github.com/DCIT/perl-CryptX/commit/9a1dd3e0c27d68e32450be5538b864c2b115ee15.patch
https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6
https://metacpan.org/release/MIK/CryptX-0.088
http://www.openwall.com/lists/oss-security/2026/04/23/2
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
