Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2018-03-22 CVE-2018-1428 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM DB2
IBM GSKit (IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
local
low complexity
ibm linux microsoft CWE-327
2.1
2018-03-22 CVE-2017-1571 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
local
low complexity
ibm linux microsoft CWE-327
2.1
2018-03-09 CVE-2017-17167 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei products
Huawei DP300 V500R002C00; TP3206 V100R002C00; ViewPoint 9030 V100R011C02; V100R011C03 have a use of a broken or risky cryptographic algorithm vulnerability.
network
huawei CWE-327
4.3
2018-03-05 CVE-2017-17428 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
network
cavium cisco CWE-327
7.1
2018-02-18 CVE-2018-7211 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
4.3
2018-02-07 CVE-2018-6829 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gnupg Libgcrypt
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack).
network
low complexity
gnupg CWE-327
5.0
2017-12-27 CVE-2017-17878 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Valvesoftware Steam Link Firmware
An issue was discovered in Valve Steam Link build 643.
network
low complexity
valvesoftware CWE-327
critical
10.0
2017-12-20 CVE-2017-1598 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium
IBM Security Guardium 10.0 Database Activity Monitor uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
5.0
2017-12-17 CVE-2017-17717 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sonatype Nexus Repository Manager
Sonatype Nexus Repository Manager through 2.14.5 has weak password encryption with a hardcoded CMMDwoV value in the LDAP integration feature.
network
low complexity
sonatype CWE-327
critical
10.0
2017-12-13 CVE-2017-17382 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Citrix products
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
network
citrix CWE-327
4.3