Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2017-10-20 CVE-2017-14937 Use of a Broken or Risky Cryptographic Algorithm vulnerability in PCU 2014
The airbag detonation algorithm allows injury to passenger-car occupants via predictable Security Access (SA) data to the internal CAN bus (or the OBD connector).
local
high complexity
pcu CWE-327
4.7
2017-10-05 CVE-2017-1339 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Tivoli Storage Manager
IBM Spectrum Protect 7.1 and 8.1 (formerly Tivoli Storage Manager) Server uses weak encryption for the password.
local
low complexity
ibm CWE-327
4.4
2017-08-18 CVE-2014-9969 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
In all Qualcomm products with Android releases from CAF using the Linux kernel, the GPS client may use an insecure cryptographic algorithm.
network
low complexity
google CWE-327
critical
9.8
2017-08-05 CVE-2017-9859 Use of a Broken or Risky Cryptographic Algorithm vulnerability in SMA products
An issue was discovered in SMA Solar Technology products.
network
low complexity
sma CWE-327
critical
9.8
2017-08-01 CVE-2017-11133 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Stashcat Heinekingmedia 0.0.80W/0.0.86W/1.7.5
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop.
network
low complexity
stashcat CWE-327
7.5
2017-06-30 CVE-2017-10668 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Xoev Osci Transport Library 1.6/1.6.1
A Padding Oracle exists in OSCI-Transport 1.2 as used in OSCI Transport Library 1.6.1 (Java) and OSCI Transport Library 1.6 (.NET).
network
high complexity
xoev CWE-327
5.9
2017-06-26 CVE-2017-9466 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tp-Link Wr841N V8 Firmware Tlwr841Nv8140724
The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption.
network
low complexity
tp-link CWE-327
critical
9.8
2017-06-08 CVE-2016-3099 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Redhat products
mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled.
network
low complexity
redhat CWE-327
7.5
2017-06-08 CVE-2014-8687 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Seagate Business NAS Firmware 2014.00319
Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
network
low complexity
seagate CWE-327
critical
9.8
2017-06-07 CVE-2017-4917 Use of a Broken or Risky Cryptographic Algorithm vulnerability in VMWare Vsphere Data Protection
VMware vSphere Data Protection (VDP) 6.1.x, 6.0.x, 5.8.x, and 5.5.x locally stores vCenter Server credentials using reversible encryption.
network
low complexity
vmware CWE-327
critical
9.8