Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2022-04-21 CVE-2022-20805 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Cisco Umbrella Secure web Gateway
A vulnerability in the automatic decryption process in Cisco Umbrella Secure Web Gateway (SWG) could allow an authenticated, adjacent attacker to bypass the SSL decryption and content filtering policies on an affected system.
low complexity
cisco CWE-327
4.1
2022-04-19 CVE-2021-39076 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium 10.5/11.3
IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-04-12 CVE-2022-22559 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell EMC Powerscale Onefs 9.3.0
Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm.
network
low complexity
dell CWE-327
7.5
2022-04-11 CVE-2022-1252 Use of a Broken or Risky Cryptographic Algorithm vulnerability in SIR Gnuboard
Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5.
network
low complexity
sir CWE-327
critical
9.1
2022-04-08 CVE-2022-26854 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell EMC Powerscale Onefs
Dell PowerScale OneFS, versions 8.2.x-9.2.x, contain risky cryptographic algorithms.
network
low complexity
dell CWE-327
critical
9.8
2022-04-06 CVE-2021-32593 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Fortinet Fortiwan
A use of a broken or risky cryptographic algorithm vulnerability [CWE-327] in the Dynamic Tunnel Protocol of FortiWAN before 4.5.9 may allow an unauthenticated remote attacker to decrypt and forge protocol communication messages.
network
low complexity
fortinet CWE-327
6.5
2022-04-01 CVE-2021-33018 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Philips products
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information.
network
low complexity
philips CWE-327
7.5
2022-04-01 CVE-2022-22327 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Urbancode Deploy
IBM UrbanCode Deploy (UCD) 7.0.5, 7.1.0, 7.1.1, and 7.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-03-10 CVE-2022-25218 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Phicomm products
The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decrypted by OpenSSL's RSA_public_decrypt() function.
network
high complexity
phicomm CWE-327
8.1
2022-03-04 CVE-2021-27756 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech Bigfix Compliance 2.0/2.0.5
"TLS-RSA cipher suites are not disabled in BigFix Compliance up to v2.0.5.
network
low complexity
hcltech CWE-327
7.5