CWE-326

GPTKB entity

Statements (68)
Predicate Object
gptkbp:instance_of gptkb:CEO
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-200
gptkbp:category Cryptographic Issues
gptkbp:consequences Unauthorized access to sensitive information.
Legal and compliance issues.
Loss of data confidentiality.
Reputation damage.
gptkbp:difficulty gptkb:High
gptkbp:enemy Phishing
Social Engineering
Data Breach
Data Manipulation
Session Hijacking
DNS Spoofing
Malware Attack
SQL Injection
Web Scraping
Denial of Service Attack
Credential Stuffing
Eavesdropping
Insider Threat
Buffer Overflow
Privilege Escalation
Cross-Site Scripting (XSS)
Clickjacking
Credential Theft
Domain Spoofing
Man-in-the-Middle Attack
Replay Attack
Path Traversal
Web Application Attacks
Directory Traversal
Remote Code Execution
Cross-Site Request Forgery (CSRF)
Supply Chain Attacks
Zero-Day Exploits
Code Injection
Advanced Persistent Threats (AP Ts)
API Attacks
Command Injection
Io T Attacks
Man-in-the-Browser Attack
Mobile Application Attacks
Open Source Vulnerabilities
Ransomware Attack
Session Fixation
Third-Party Library Vulnerabilities
XML External Entity (XXE) Attack
gptkbp:example Not using encryption for sensitive data.
Using AES with a short key length.
Using a weak encryption algorithm like DES.
Using outdated cryptographic algorithms.
gptkbp:has_weakness gptkb:CWE-326
gptkb:CWE-327
CWE-311
https://www.w3.org/2000/01/rdf-schema#label CWE-326
gptkbp:impact Data integrity issues
Data exposure
gptkbp:is_described_as The product uses an encryption algorithm that is not strong enough to protect sensitive data.
gptkbp:is_protected_by Regularly update cryptographic protocols.
Use strong encryption algorithms.
gptkbp:is_referenced_in NISTSP 800-131 A
OWASP Cryptographic Storage Cheat Sheet
gptkbp:name Inadequate Encryption Strength
gptkbp:related_to gptkb:CWE-326
gptkb:CWE-327
CWE-311