Statements (22)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-200
|
gptkbp:category |
Cryptographic Issues
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
Using M D5 for password hashing
Using SHA-1 for digital signatures |
gptkbp:has_weakness |
CWE-310
CWE-339 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-327
|
gptkbp:impact |
Compromise of authenticity
Compromise of confidentiality Compromise of integrity |
gptkbp:is_described_as |
This weakness occurs when a cryptographic algorithm is used that is known to be weak or broken.
|
gptkbp:is_protected_by |
Regularly update cryptographic libraries
Use strong, well-reviewed cryptographic algorithms |
gptkbp:is_referenced_in |
gptkb:NIST_Special_Publication_800-131_A
CWE-327 on MITRE OWASP Cryptographic Storage Cheat Sheet |
gptkbp:name |
Use of a Broken or Risky Cryptographic Algorithm
|
gptkbp:related_to |
gptkb:CWE-326
CWE-320 |