CWE-327

GPTKB entity

Statements (22)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-200
gptkbp:category Cryptographic Issues
gptkbp:difficulty gptkb:High
gptkbp:example Using M D5 for password hashing
Using SHA-1 for digital signatures
gptkbp:has_weakness CWE-310
CWE-339
https://www.w3.org/2000/01/rdf-schema#label CWE-327
gptkbp:impact Compromise of authenticity
Compromise of confidentiality
Compromise of integrity
gptkbp:is_described_as This weakness occurs when a cryptographic algorithm is used that is known to be weak or broken.
gptkbp:is_protected_by Regularly update cryptographic libraries
Use strong, well-reviewed cryptographic algorithms
gptkbp:is_referenced_in gptkb:NIST_Special_Publication_800-131_A
CWE-327 on MITRE
OWASP Cryptographic Storage Cheat Sheet
gptkbp:name Use of a Broken or Risky Cryptographic Algorithm
gptkbp:related_to gptkb:CWE-326
CWE-320