The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
A weak encryption scheme can be subjected to brute force attacks that have a reasonable chance of succeeding using current attack methods and resources.
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
CVE: CVE-2001-1546
Weak encryption
CVE: CVE-2004-2172
Weak encryption (chosen plaintext attack)
CVE: CVE-2002-1682
Weak encryption
CVE: CVE-2002-1697
Weak encryption produces same ciphertext from the same plaintext blocks.
CVE: CVE-2002-1739
Weak encryption
CVE: CVE-2005-2281
Weak encryption scheme
CVE: CVE-2002-1872
Weak encryption (XOR)
CVE: CVE-2002-1910
Weak encryption (reversible algorithm).
CVE: CVE-2002-1946
Weak encryption (one-to-one mapping).
CVE: CVE-2002-1975
Encryption error uses fixed salt, simplifying brute force / dictionary attacks (overlaps randomness).
Phase | Note |
---|---|
Architecture and Design | COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic. |
N/A