Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2019-12-17 CVE-2019-18832 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Barco Clickshare Button R9861500D01 Firmware
Barco ClickShare Button R9861500D01 devices before 1.9.0 have incorrect Credentials Management.
network
high complexity
barco CWE-327
8.1
2019-12-12 CVE-2019-17428 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Intesync Solismed 3.3
An issue was discovered in Intesync Solismed 3.3sp1.
network
high complexity
intesync CWE-327
5.9
2019-11-08 CVE-2019-16208 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Broadcom Brocade Sannav 1.1.0/1.1.1
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
network
low complexity
broadcom CWE-327
7.5
2019-10-25 CVE-2019-4399 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud Orchestrator
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2019-10-23 CVE-2019-8237 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Adobe Acrobat DC
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an insufficiently robust encryption vulnerability.
network
low complexity
adobe CWE-327
critical
9.8
2019-10-09 CVE-2019-11341 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android 9.0
On certain Samsung P(9.0) phones, an attacker with physical access can start a TCP Dump capture without the user's knowledge.
low complexity
google CWE-327
4.6
2019-10-09 CVE-2018-5745 Use of a Broken or Risky Cryptographic Algorithm vulnerability in ISC Bind
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation.
network
low complexity
isc CWE-327
4.9
2019-09-27 CVE-2019-3736 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell EMC Integrated Data Protection Appliance Firmware 2.0/2.1/2.2
Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a password storage vulnerability in the ACM component.
network
low complexity
dell CWE-327
7.2
2019-09-27 CVE-2019-9399 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android 10.0
The Print Service is susceptible to man in the middle attacks due to improperly used crypto.
network
high complexity
google CWE-327
5.9
2019-09-16 CVE-2019-16370 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gradle
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
network
high complexity
gradle CWE-327
5.9