Insecure encryption algorithm
Description
The application uses insecure encryption algorithms.
Impact
- Reverse the ciphertext and collect sensible information. - Tamper protected data by exploiting algorithm collisions.
Recommendation
Use algorithms considered cryptographically secure.
Threat
Anonymous attacker from adjacent network.
Expected Remediation Time
⏱️ 30 minutes.