The software relies on a cryptographic algorithm or protocol that is either fundamentally flawed or considered too weak by modern security standards.
Cryptographic algorithms scramble data to protect it, but using a broken or risky one is like securing a vault with a cheap lock. Attackers can exploit these weak algorithms to decrypt sensitive information, forge digital identities, or tamper with data. Developers should avoid creating custom cryptography and instead rely on a small set of well-vetted, industry-standard algorithms that have survived extensive public scrutiny. Managing this risk is especially critical in hardware, where a cryptographic flaw often requires a physical product recall, as the algorithm cannot be patched like software. Furthermore, hardware devices have long lifespans, meaning the encryption must remain strong against steadily increasing computational power over many years. This makes selecting future-proof, robust algorithms from the start a non-negotiable requirement for secure design.
Impact: Read Application Data
The confidentiality of sensitive data may be compromised by the use of a broken or risky cryptographic algorithm.
Impact: Modify Application Data
The integrity of sensitive data may be compromised by the use of a broken or risky cryptographic algorithm.
Impact: Hide Activities
If the cryptographic algorithm is used to ensure the identity of the source of the data (such as digital signatures), then a broken algorithm will compromise this scheme and the source of the data cannot be proven.
Strategy: Libraries or Frameworks
Effectiveness: Defense in Depth
Strategy: Libraries or Frameworks
cjavaphpotherotherHigh