๐Ÿ” CVE Alert

CVE-2026-6146

MEDIUM 5.3

Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
2th

Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys. Amazon::Credentials stores credentials in an obfuscated form to prevent access to the secrets from a data dump of the object. Before version 1.3.0, the secrets were encrypted using a 64-bit key that was generated using the built-in rand function, which is predictable and unsuitable for cryptography.

CWE CWE-338
Vendor bigfoot
Product amazon::credentials
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for bigfoot amazon::credentials

Be the first to know when new medium vulnerabilities affecting bigfoot amazon::credentials are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

BIGFOOT / Amazon::Credentials
0 โ‰ค 1.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metacpan.org: https://metacpan.org/release/BIGFOOT/Amazon-Credentials-1.2.0/source/lib/Amazon/Credentials.pm#L1415-1418 metacpan.org: https://metacpan.org/release/BIGFOOT/Amazon-Credentials-1.3.0/changes openwall.com: http://www.openwall.com/lists/oss-security/2026/05/11/15