Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-46473
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-21 May, 2026 | 18:53
Updated At-21 May, 2026 | 21:31
Rejected At-
▼CVE Numbering Authority (CNA)
Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

Affected Products
Vendor
TCHATZI
Product
Authen::TOTP
Collection URL
https://cpan.org/modules
Package Name
Authen-TOTP
Repo
https://github.com/tchatzi/Authen-TOTP
Program Files
  • lib/Authen/TOTP.pm
Program Routines
  • Authen::TOTP::gen_secret
Default Status
unaffected
Versions
Affected
  • From 0 before 0.1.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-331CWE-331 Insufficient Entropy
Type: CWE
CWE ID: CWE-331
Description: CWE-331 Insufficient Entropy
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-114CAPEC-114 Authentication Abuse
CAPEC ID: CAPEC-114
Description: CAPEC-114 Authentication Abuse
Solutions

Upgrade to version 0.1.1 or later.

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/release/TCHATZI/Authen-TOTP-0.1.1/changes
release-notes
https://github.com/tchatzi/Authen-TOTP/commit/d04f30cc6538d77fc6b6d550da450cf3017b8561.patch
patch
Hyperlink: https://metacpan.org/release/TCHATZI/Authen-TOTP-0.1.1/changes
Resource:
release-notes
Hyperlink: https://github.com/tchatzi/Authen-TOTP/commit/d04f30cc6538d77fc6b6d550da450cf3017b8561.patch
Resource:
patch
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2026/05/21/15
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/05/21/15
Resource: N/A
Details not found