052 – Insecure encryption algorithm
Description
The application uses insecure encryption algorithms.
Impact
- Reverse the ciphertext and collect sensible information. - Tamper protected data by exploiting algorithm collisions.
Recommendation
Use algorithms considered cryptographically secure.
Threat
Anonymous attacker from adjacent network.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: A
- Attack complexity: H
- Attack Requirements: N
- Privileges required: N
- User interaction: N
- Confidentiality (VC): L
- Integrity (VI): N
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: A