logo

Database

Description

The application uses insecure encryption algorithms.

Impact

- Reverse the ciphertext and collect sensible information. - Tamper protected data by exploiting algorithm collisions.

Recommendation

Use algorithms considered cryptographically secure.

Threat

Anonymous attacker from adjacent network.

Expected Remediation Time

⏱️ 30 minutes.