Vulnerabilities > Inadequate Encryption Strength

DATE CVE VULNERABILITY TITLE RISK
2017-11-22 CVE-2017-8174 Inadequate Encryption Strength vulnerability in Huawei products
Huawei USG6300 V100R001C30SPC300 and USG6600 with software of V100R001C30SPC500,V100R001C30SPC600,V100R001C30SPC700,V100R001C30SPC800 have a weak algorithm vulnerability.
network
low complexity
huawei CWE-326
7.5
2017-10-24 CVE-2017-1375 Inadequate Encryption Strength vulnerability in IBM Storwize Unified V7000 Software 1.5/1.6
IBM System Storage Storwize V7000 Unified (V7000U) 1.5 and 1.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-326
7.5
2017-10-19 CVE-2012-6707 Inadequate Encryption Strength vulnerability in Wordpress
WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values.
network
low complexity
wordpress CWE-326
7.5
2017-10-01 CVE-2017-14797 Inadequate Encryption Strength vulnerability in Philips HUE Bridge Bsb002 Firmware 1707040932
Lack of Transport Encryption in the public API in Philips Hue Bridge BSB002 SW 1707040932 allows remote attackers to read API keys (and consequently bypass the pushlink protection mechanism, and obtain complete control of the connected accessories) by leveraging the ability to sniff HTTP traffic on the local intranet network.
high complexity
philips CWE-326
7.5
2017-09-20 CVE-2017-9645 Inadequate Encryption Strength vulnerability in Mirion products
An Inadequate Encryption Strength issue was discovered in Mirion Technologies DMC 3000 Transmitter Module, iPam Transmitter f/DMC 2000, RDS-31 iTX and variants (including RSD31-AM Package), DRM-1/2 and variants (including Solar PWR Package), DRM and RDS Based Boundary Monitors, External Transmitters, Telepole II, and MESH Repeater (Telemetry Enabled Devices).
low complexity
mirion CWE-326
6.5
2017-09-11 CVE-2017-14262 Inadequate Encryption Strength vulnerability in Samsung products
On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.
network
high complexity
samsung CWE-326
8.1
2017-09-01 CVE-2017-12871 Inadequate Encryption Strength vulnerability in Simplesamlphp
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
network
high complexity
simplesamlphp CWE-326
5.9
2017-08-23 CVE-2017-11317 Inadequate Encryption Strength vulnerability in Telerik UI for Asp.Net Ajax
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
network
low complexity
telerik CWE-326
critical
9.8
2017-08-18 CVE-2015-0575 Inadequate Encryption Strength vulnerability in Google Android
In all Qualcomm products with Android releases from CAF using the Linux kernel, insecure ciphersuites were included in the default configuration.
network
low complexity
google CWE-326
critical
9.8
2017-08-18 CVE-2014-9975 Inadequate Encryption Strength vulnerability in Google Android
In all Qualcomm products with Android releases from CAF using the Linux kernel, a rollback vulnerability potentially exists in Full Disk Encryption.
network
low complexity
google CWE-326
critical
9.8