logo

Database

Description

The application uses algorithms with insecure cipher block chaining.

Impact

Exploit cipher process vulnerability and collect sensible information.

Recommendation

Use algorithms considered cryptographically secure.

Threat

Unauthorized attacker from adjacent network.

Expected Remediation Time

⏱️ 30 minutes.