logo

Database

Description

The application uses algorithms with insecure cipher block chaining.

Impact

Exploit cipher process vulnerability and collect sensible information.

Recommendation

Use algorithms considered cryptographically secure.

Threat

Unauthorized attacker from adjacent network.

Expected Remediation Time

⏱️ 30 minutes.

Score

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

Attack vector

A

Attack complexity

H

Attack requirements

N

Privileges required

N

User interaction

P

Confidentiality (VC)

L

Integrity (VI)

N

Availability (VA)

N

Confidentiality (SC)

N

Integrity (SI)

N

Availability (SA)

N

Threat 4.0

Exploit maturity

P

Vector string

CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P