Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2018-11-27 CVE-2018-7959 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei Espace 7950 Firmware V200R003C30
There is a short key vulnerability in Huawei eSpace product.
network
high complexity
huawei CWE-327
5.9
2018-10-30 CVE-2018-0734 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack.
network
high complexity
openssl canonical debian nodejs netapp oracle CWE-327
5.9
2018-10-29 CVE-2018-0735 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack.
network
high complexity
openssl canonical debian nodejs netapp oracle CWE-327
5.9
2018-10-23 CVE-2018-18587 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Bigprof Appgini 5.70
BigProf AppGini 5.70 stores the passwords in the database using the MD5 hash.
network
low complexity
bigprof CWE-327
5.3
2018-09-11 CVE-2018-11070 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Bsafe Crypto-J and RSA Bsafe Ssl-J
RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack.
network
high complexity
dell CWE-327
5.9
2018-09-11 CVE-2018-11069 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Bsafe Ssl-J
RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption.
network
high complexity
dell CWE-327
5.9
2018-09-10 CVE-2018-16806 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Pektron Passive Keyless Entry and Start System Firmware
A Pektron Passive Keyless Entry and Start (PKES) system, as used on the Tesla Model S and possibly other vehicles, relies on the DST40 cipher, which makes it easier for attackers to obtain access via an approach involving a 5.4 TB precomputation, followed by wake-frame reception and two challenge/response operations, to clone a key fob within a few seconds.
low complexity
pektron CWE-327
6.5
2018-08-31 CVE-2018-11057 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x) contains a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption.
network
high complexity
dell oracle CWE-327
5.9
2018-08-17 CVE-2018-15355 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118
Usage of SSLv2 and SSLv3 leads to transmitted data decryption in Kraftway 24F2XG Router firmware 3.5.30.1118.
network
high complexity
kraftway CWE-327
5.9
2018-07-20 CVE-2017-1575 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling File Gateway
IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) uses weaker than expected cryptographic algorithms that could allow a local attacker to decrypt highly sensitive information.
local
low complexity
ibm CWE-327
5.5