Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2022-12-13 CVE-2022-27581 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46832 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46833 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46834 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-06 CVE-2022-34361 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Sterling Secure Proxy 6.0.3
IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-11-14 CVE-2022-34320 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.1
IBM CICS TX 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-11-14 CVE-2022-34319 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cics TX 11.7
IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-11-12 CVE-2022-45195 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Simplex Chat and Simplexmq
SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key.
network
high complexity
simplex CWE-327
5.3
2022-10-31 CVE-2021-27784 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Hcltech HCL Launch Container Image 7.1.0.1
The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key.
network
low complexity
hcltech CWE-327
7.5
2022-10-06 CVE-2022-39237 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sylabs Singularity Image Format
syslabs/sif is the Singularity Image Format (SIF) reference implementation.
network
low complexity
sylabs CWE-327
critical
9.8