256 vulnerabilities classified as CWE-327 (使用已被攻破或存在风险的密码学算法). AI Chinese analysis included.
CWE-327 represents a critical implementation weakness where software relies on deprecated, broken, or inherently risky cryptographic algorithms and protocols. This flaw typically allows attackers to exploit mathematical vulnerabilities or insufficient key lengths to decrypt sensitive data, forge digital signatures, or manipulate transmitted information without detection. By bypassing intended security controls, adversaries can expose confidential records, spoof user identities, or alter system states, leading to severe confidentiality and integrity breaches. To mitigate this risk, developers must rigorously validate cryptographic choices against current industry standards, such as NIST guidelines, ensuring the use of robust, modern algorithms like AES-GCM or SHA-256. Regular security audits and automated static analysis tools further help identify and replace obsolete cryptographic implementations before deployment, thereby maintaining strong data protection against evolving threat landscapes.
EVP_des_ecb();Cipher des=Cipher.getInstance("DES..."); des.initEncrypt(key2);The manufacturer chooses a SHA1 hardware accelerator for to implement the scheme because it already has a working SHA1 Intellectual Property (IP) that the manufacturer had created and used earlier, so this reuse of IP saves design cost.The manufacturer could have chosen a cryptographic solution that is recommended by the wide security community (including standard-setting bodies like NIST) and is not expected to be broken (or even better, weakened) within the reasonable life expectancy of the hardware product. In this case, the architects could have used SHA-2 or SHA-3, even if it meant that such choice would cost extra.| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-11035 | weak CSRF tokens in GLPI — GLPI | 7.5 | High | 2020-05-05 |
| CVE-2019-15795 | python-apt uses MD5 for validation — Python-apt | 4.7 | Medium | 2020-03-26 |
| CVE-2020-7001 | Moxa EDS-G516E和EDS-510E 加密问题漏洞 — Moxa EDS-G516E Series firmware, Version 5.2 or lower | 7.5 | - | 2020-03-24 |
| CVE-2020-6987 | Moxa PT-7528和PT-7828 加密问题漏洞 — Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower | 7.5 | - | 2020-03-24 |
| CVE-2020-6984 | 多款Rockwell Automation产品加密问题漏洞 — Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior | 7.5 | - | 2020-03-16 |
| CVE-2020-5229 | Opencast stores passwords using outdated MD5 hash algorithm — opencast | 7.7 | High | 2020-01-30 |
| CVE-2019-3700 | yast: Fallback to DES without configuration in /etc/login.def — Factory | 2.9 | Low | 2020-01-24 |
| CVE-2019-18340 | Siemens SiNVR 3 Central Control Server和SiNVR 3 Video Server 加密问题漏洞 — Control Center Server (CCS) | 5.5 | Medium | 2019-12-12 |
| CVE-2019-10929 | 多款Siemens产品加密问题漏洞 — SIMATIC CP 1626 | 5.9 | - | 2019-08-13 |
| CVE-2016-5431 | Gree PHP JOSE Library 加密问题漏洞 — jose-php | 7.5 | - | 2019-08-07 |
| CVE-2019-1828 | Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability — Cisco Small Business RV Series Router Firmware | 8.1 | - | 2019-04-04 |
| CVE-2019-7477 | SonicWall SonicOS和SonicOSv 加密问题漏洞 — SonicOS | 5.9 | - | 2019-04-02 |
| CVE-2019-3818 | Linux kernel 加密问题漏洞 — kube-rbac-proxy | 7.5 | - | 2019-02-05 |
| CVE-2019-0030 | Juniper ATP: Password hashing uses DES and a hardcoded salt — Juniper ATP | 9.8 | - | 2019-01-15 |
| CVE-2018-5382 | Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions — Bouncy Castle | 7.8 | - | 2018-04-16 |
| CVE-2017-5243 | Rapid7 Nexpose 安全漏洞 — Nexpose hardware appliance | 8.5 | - | 2017-06-06 |
Vulnerabilities classified as CWE-327 (使用已被攻破或存在风险的密码学算法) represent 256 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.