Vulnerabilities > Use of a Broken or Risky Cryptographic Algorithm

DATE CVE VULNERABILITY TITLE RISK
2023-02-11 CVE-2022-34444 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Powerscale Onefs
Dell PowerScale OneFS, versions 9.2.0.x through 9.4.0.x contain an information vulnerability.
network
low complexity
dell CWE-327
7.5
2023-01-26 CVE-2022-43917 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Websphere Application Server 8.5/9.0
IBM WebSphere Application Server 8.5 and 9.0 traditional container uses weaker than expected cryptographic keys that could allow an attacker to decrypt sensitive information.
network
low complexity
ibm CWE-327
7.5
2023-01-17 CVE-2021-36647 Use of a Broken or Risky Cryptographic Algorithm vulnerability in ARM Mbed TLS
Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.
local
high complexity
arm CWE-327
4.7
2022-12-22 CVE-2022-22461 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Verify Governance 10.0.1
IBM Security Verify Governance, Identity Manager 10.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-12-20 CVE-2022-38391 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Spectrum Control 5.4.0.0
IBM Spectrum Control 5.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2022-12-19 CVE-2022-4610 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Clickstudios Passwordstate
A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome.
local
low complexity
clickstudios CWE-327
5.5
2022-12-13 CVE-2022-27581 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46832 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46833 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5
2022-12-13 CVE-2022-46834 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Sick products
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
network
low complexity
sick CWE-327
6.5