logo

269 Insecure encryption algorithm - Blowfish


Description

Insecure algorithms such as Blowfish are used to encrypt the information stored in the code.


Impact

Decrypt the credentials that are stored encrypted with blowfish.


Recommendation

Use secure algorithms such as AES or RSA.


Threat

Unauthorized user with access to the code.


Expected Remediation Time

30 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: A
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Fixes


Last updated

2024/02/18