CVE Vulnerabilities

CVE-2020-16156

Improper Verification of Cryptographic Signature

Published: Dec 13, 2021 | Modified: Nov 03, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.8 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

CPAN 2.28 allows Signature Verification Bypass.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Comprehensive_perl_archive_networkPerl2.28 (including)2.28 (including)
Comprehensive_perl_archive_networkPerl2.28-trial (including)2.28-trial (including)
Red Hat Enterprise Linux 8RedHatperl-CPAN-0:2.18-402.el8_10*
PerlUbuntubionic*
PerlUbuntuesm-infra-legacy/trusty*
PerlUbuntuesm-infra/bionic*
PerlUbuntuesm-infra/focal*
PerlUbuntuesm-infra/xenial*
PerlUbuntufocal*
PerlUbuntuhirsute*
PerlUbuntuimpish*
PerlUbuntujammy*
PerlUbuntukinetic*
PerlUbuntulunar*
PerlUbuntutrusty*
PerlUbuntutrusty/esm*
PerlUbuntuupstream*
PerlUbuntuxenial*

References