Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2024-06-26 CVE-2024-29175 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System
Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability.
network
high complexity
dell CWE-327
5.9
2024-06-21 CVE-2024-35537 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Tvsmotor TVS Connect 4.6.0/5.0.0
TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption.
network
low complexity
tvsmotor CWE-327
7.5
2024-06-13 CVE-2024-32911 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
There is a possible escalation of privilege due to improperly used crypto.
network
low complexity
google CWE-327
critical
9.8
2024-06-12 CVE-2024-5559 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Schneider-Electric Powerlogic P5 Firmware
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device.
low complexity
schneider-electric CWE-327
6.8
2024-05-21 CVE-2024-31989 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Argoproj Argo CD
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.
low complexity
argoproj CWE-327
critical
9.0
2024-02-23 CVE-2023-51392 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Silabs Emberznet 7.2.0/7.2.3
Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
network
low complexity
silabs CWE-327
critical
9.8
2024-02-02 CVE-2023-51838 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Meshcentral 1.1.16
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.
network
low complexity
meshcentral CWE-327
7.5
2024-02-01 CVE-2024-1040 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Gesslergmbh Web-Master Firmware 7.9
Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm.
local
low complexity
gesslergmbh CWE-327
4.4
2024-01-29 CVE-2023-51839 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Devicefarmer Smartphone Test Farm 3.6.6
DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm.
network
low complexity
devicefarmer CWE-327
critical
9.1
2024-01-12 CVE-2023-49259 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hongdian H8951-4G-Esp Firmware
The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.
network
low complexity
hongdian CWE-327
7.5