logo

052 Insecure encryption algorithm


Description

The application uses insecure encryption algorithms.


Impact

- Reverse the ciphertext and collect sensible information. - Tamper protected data by exploiting algorithm collisions.


Recommendation

Use algorithms considered cryptographically secure.


Threat

Anonymous attacker from adjacent network.


Expected Remediation Time

30 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: A
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: A

Requirements


Fixes


Last updated

2024/02/08