logo

Database

Description

Encryption algorithms are handled in ECB mode, which is insecure.

Impact

Reverse ciphertext to find sensitive information.

Recommendation

Use algorithms considered cryptographically secure.

Threat

Authorized attacker from the internal network.

Expected Remediation Time

⏱️ 30 minutes.