Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2023-08-28 CVE-2023-34758 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Bishopfox Sliver
Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses.
network
high complexity
bishopfox CWE-327
8.1
2023-08-27 CVE-2023-38730 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Storage Copy Data Management
IBM Storage Copy Data Management 2.2.0.0 through 2.2.19.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2023-08-15 CVE-2023-4326 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Broadcom Raid Controller web Interface 51.12.02779
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites
network
low complexity
broadcom CWE-327
7.5
2023-08-15 CVE-2023-4331 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Broadcom Raid Controller web Interface 51.12.02779
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols
network
low complexity
broadcom CWE-327
7.5
2023-08-09 CVE-2023-23347 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech Dryice Iautomate 6.0/6.1/6.2
HCL DRYiCE iAutomate is affected by the use of a broken cryptographic algorithm.
local
low complexity
hcltech CWE-327
7.1
2023-08-09 CVE-2023-23346 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech Dryice Mycloud
HCL DRYiCE MyCloud is affected by the use of a broken cryptographic algorithm.
local
low complexity
hcltech CWE-327
7.1
2023-07-19 CVE-2021-38933 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Connect:Express for Unix 1.5.0
IBM Sterling Connect:Direct for UNIX 1.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2023-07-13 CVE-2023-34130 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sonicwall Analytics and Global Management System
SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data.
network
low complexity
sonicwall CWE-327
critical
9.8
2023-07-13 CVE-2023-21399 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Google Android
there is a possible way to bypass cryptographic assurances due to a logic error in the code.
local
low complexity
google CWE-327
7.8
2023-07-11 CVE-2023-36749 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Siemens products
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0).
network
high complexity
siemens CWE-327
7.4