Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object.
Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography.
No advisories yet.
Solution
Upgrade to version 1.3.0 or later.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bigfoot
Bigfoot amazon::credentials |
|
| Vendors & Products |
Bigfoot
Bigfoot amazon::credentials |
Mon, 11 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys. Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object. Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography. | |
| Title | Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys | |
| Weaknesses | CWE-338 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-13T13:00:09.543Z
Reserved: 2026-04-12T17:24:50.568Z
Link: CVE-2026-6146
Updated: 2026-05-11T21:29:37.446Z
Status : Deferred
Published: 2026-05-11T20:25:47.597
Modified: 2026-05-13T14:18:13.397
Link: CVE-2026-6146
No data.
OpenCVE Enrichment
Updated: 2026-05-13T16:00:17Z