Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2017-11-22 CVE-2017-8191 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei Fusionsphere Openstack V100R006C00Spc102(Nfv)
FusionSphere OpenStack V100R006C00SPC102(NFV)has a week cryptographic algorithm vulnerability.
network
high complexity
huawei CWE-327
5.9
2017-11-22 CVE-2017-8157 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei products
OceanStor 5800 V3 with software V300R002C00 and V300R002C10, OceanStor 6900 V3 V300R001C00 has an information leakage vulnerability.
network
high complexity
huawei CWE-327
5.9
2017-10-30 CVE-2012-4449 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Apache Hadoop
Apache Hadoop before 0.23.4, 1.x before 1.0.4, and 2.x before 2.0.2 generate token passwords using a 20-bit secret when Kerberos security features are enabled, which makes it easier for context-dependent attackers to crack secret keys via a brute-force attack.
network
low complexity
apache CWE-327
critical
9.8
2017-10-30 CVE-2015-0226 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Apache Wss4J
Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks information about decryption failures when decrypting an encrypted key or message data, which makes it easier for remote attackers to recover the plaintext form of a symmetric key via a series of crafted messages.
network
low complexity
apache CWE-327
7.5
2017-10-29 CVE-2017-15998 Use of a Broken or Risky Cryptographic Algorithm vulnerability in NQ Contacts Backup & Restore 1.1
In the "NQ Contacts Backup & Restore" application 1.1 for Android, DES encryption with a static key is used to secure transmitted contact data.
network
low complexity
nq CWE-327
7.5
2017-10-29 CVE-2017-15997 Use of a Broken or Risky Cryptographic Algorithm vulnerability in NQ Contacts Backup & Restore 1.1
In the "NQ Contacts Backup & Restore" application 1.1 for Android, RC4 encryption is used to secure the user password locally stored in shared preferences.
local
low complexity
nq CWE-327
7.8
2017-10-20 CVE-2017-14937 Use of a Broken or Risky Cryptographic Algorithm vulnerability in PCU 2014
The airbag detonation algorithm allows injury to passenger-car occupants via predictable Security Access (SA) data to the internal CAN bus (or the OBD connector).
local
high complexity
pcu CWE-327
4.7
2017-10-05 CVE-2017-1339 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Tivoli Storage Manager
IBM Spectrum Protect 7.1 and 8.1 (formerly Tivoli Storage Manager) Server uses weak encryption for the password.
local
low complexity
ibm CWE-327
4.4
2017-08-18 CVE-2014-9969 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
In all Qualcomm products with Android releases from CAF using the Linux kernel, the GPS client may use an insecure cryptographic algorithm.
network
low complexity
google CWE-327
critical
9.8
2017-08-05 CVE-2017-9859 Use of a Broken or Risky Cryptographic Algorithm vulnerability in SMA products
An issue was discovered in SMA Solar Technology products.
network
low complexity
sma CWE-327
critical
9.8