top of page
perceptive_background_267k.jpg

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.

The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, …

Published:

22 april 2026 om 22:00:00

Alert date:

23 april 2026 om 15:02:55

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Web Technologies

CVE-2026-41564 affects CryptX versions before 0.088 for Perl, where cryptographic modules fail to reseed PRNG state after forking. The vulnerability causes child processes to share identical PRNG state, leading to predictable randomized operations including key generation. Two ECDSA or DSA signatures from different processes can expose the private signing key through nonce-reuse attacks. This particularly impacts preforking web servers like Starman where crypto objects are inherited by worker processes. The flaw affects multiple cryptographic modules including RSA, DSA, DH, ECC, Ed25519, and X25519 implementations.

Technical details

Mitigation steps:

Affected products:

CryptX
Perl
Starman web server

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page