logo

094 Insecure encryption algorithm - Cipher Block Chaining


Description

The application uses algorithms with insecure cipher block chaining.


Impact

Exploit cipher process vulnerability and collect sensible information.


Recommendation

Use algorithms considered cryptographically secure.


Threat

Unauthorized attacker from adjacent network.


Expected Remediation Time

30 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: A
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: P
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Fixes


Last updated

2024/02/12