CWE-327

GPTKB entity

Statements (22)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:category Cryptographic Issues
gptkbp:description This weakness occurs when a cryptographic algorithm is used that is known to be weak or broken.
gptkbp:difficulty_levels gptkb:High
gptkbp:example Using SHA-1 for digital signatures
Using MD5 for password hashing
gptkbp:has_weakness CWE-310
CWE-339
https://www.w3.org/2000/01/rdf-schema#label CWE-327
gptkbp:impact Compromise of authenticity
Compromise of confidentiality
Compromise of integrity
gptkbp:is_referenced_in gptkb:NIST_Special_Publication_800-131_A
CWE-327 on MITRE
OWASP Cryptographic Storage Cheat Sheet
gptkbp:name Use of a Broken or Risky Cryptographic Algorithm
gptkbp:prevention Regularly update cryptographic libraries
Use strong, well-reviewed cryptographic algorithms
gptkbp:related_to gptkb:CWE-326
CWE-320
gptkbp:bfsParent gptkb:CWE-200
gptkbp:bfsLayer 8