CWE-326: CWE-326
Yearly Trend
Top Affected Vendors
All CWE-326 CVEs (58)
CVE-2021-42216 is a critical cryptographic vulnerability in AnonAddy email forwarding service that allows attackers to bypass email verification and p...
Dec 15, 2021CVE-2025-45765 is a weak encryption vulnerability in ruby-jwt v3.0.0.beta1 that allows attackers to potentially forge or tamper with JWT tokens due to...
Aug 7, 2025Brocade ASCG versions before 3.3.0 use medium-strength cryptography algorithms on internal ports 9000 and 8036, allowing attackers to potentially decr...
Jul 17, 2025Apache Linkis versions up to 1.3.1 use a default authentication token that is too simple and predictable, allowing attackers to easily guess or obtain...
Apr 10, 2023A flaw in LibreOffice's password storage system weakens encryption from 128-bit to 43-bit entropy, making stored web connection passwords vulnerable t...
Jul 25, 2022This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...
Jun 23, 2023This vulnerability allows attackers to intercept or manipulate communications between NetIQ Advanced Authentication clients and servers by exploiting ...
Aug 28, 2024This vulnerability in FIWARE Keyrock allows attackers to predict password reset tokens due to insufficient randomness. Attackers can take over any use...
Aug 12, 2024This CVE describes vulnerabilities in Aqara Hub firmware update processes that allow attackers to install malicious firmware without proper signature ...
Dec 10, 2025This vulnerability in the Bulletproofs zero-knowledge proof implementation allows attackers to forge proofs by manipulating the Fiat-Shamir transforma...
Apr 21, 2022CVE-2024-28860 is a cryptographic vulnerability in Cilium's IPsec transparent encryption that allows man-in-the-middle attackers to perform chosen pla...
Mar 27, 2024This vulnerability allows malicious Android apps to bypass background launch restrictions, enabling them to start activities without user interaction....
Jul 13, 2023This vulnerability in Android's AccessibilityService allows malicious apps to hide themselves from the user interface due to a logic error. This enabl...
May 15, 2023Dell Data Protection Advisor versions 19.9 contain an inadequate encryption strength vulnerability (CWE-326). A low-privileged attacker with remote ac...
May 29, 2024This vulnerability in Jervis (a library for Jenkins pipeline scripts) uses a weak key derivation method where the same password always produces the sa...
Jan 13, 2026This TLS 1.3 vulnerability allows malicious servers to bypass perfect forward secrecy (PFS) requirements when using pre-shared keys (PSK). Clients may...
Nov 21, 2025This vulnerability affects Siemens APOGEE PXC and TALON TC building automation controllers using weak hard-coded encryption keys. Attackers can decryp...
Feb 11, 2025Portainer before version 2.20.2 uses an improper encryption algorithm in its AesEncrypt function, potentially allowing attackers to decrypt sensitive ...
Oct 2, 2024OpenSlides 4.0.15 uses a weak hashing algorithm to store user passwords, making them vulnerable to offline cracking attacks. This affects all OpenSlid...
Sep 25, 2024Apache Linkis versions up to 1.5.0 use a cryptographically weak random string generator (Commons Lang's RandomStringUtils) for Py4j token generation i...
Sep 25, 2024CVE-2024-32758 is a cryptographic weakness in exacqVision video management systems where client-server communication uses insufficient key length duri...
Aug 1, 2024The encrypt() function in Ninja Core v7.0.0 uses a weak cryptographic algorithm, potentially allowing attackers to decrypt sensitive information. This...
Jun 6, 2024CVE-2024-29950 is a cryptographic vulnerability in Brocade SANnav's FileTransfer class that uses the deprecated ssh-rsa signature scheme with SHA-1 ha...
Apr 17, 2024This vulnerability in upydev's keygen.py module allows attackers to decrypt sensitive information due to weak encryption padding. It affects systems r...
Nov 20, 2023CVE-2023-44690 is an inadequate encryption strength vulnerability in mycli 1.27.0 that allows attackers to decrypt sensitive configuration data. This ...
Oct 19, 2023This vulnerability allows 5G SMS messages to be sent without encryption in VPN environments, potentially exposing message contents to interception. It...
Sep 27, 2023This vulnerability allows attackers to gain root access to Tenda CP3 IP cameras via TELNET or UART using hard-coded default credentials with weak encr...
May 10, 2023This vulnerability in Samsung Flow for Android allows attackers on the same network to decrypt encrypted messages or inject malicious commands due to ...
Feb 9, 2023IBM Security Access Manager Appliance uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects IBM...
Jul 8, 2022IBM Spectrum Scale versions 5.1.0 through 5.1.3.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This ...
May 3, 2022This vulnerability allows attackers to break the encryption in MDT AutoSave software versions prior to v6.02.06, potentially gaining unauthorized acce...
Apr 1, 2022CVE-2022-24318 is an encryption weakness vulnerability in Schneider Electric's SCADA systems that allows non-encrypted communication between outdated ...
Feb 9, 2022CVE-2021-20400 is a cryptographic weakness vulnerability in IBM QRadar SIEM where the software uses weaker-than-expected encryption algorithms. This a...
Dec 1, 2021CVE-2021-44150 is a cryptographic weakness vulnerability in tusdotnet client versions through 2.5.0 that uses SHA-1 for file content verification. Thi...
Nov 22, 2021IBM Tivoli Key Lifecycle Manager versions 3.0 through 4.1 use weak cryptographic algorithms that could allow attackers to decrypt sensitive informatio...
Nov 15, 2021IBM Cloud Pak for Applications 4.3 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects organi...
Jul 13, 2021Emerson Rosemount X-STREAM Gas Analyzers use weak encryption for sensitive data storage, allowing attackers to potentially decrypt and obtain credenti...
May 20, 2021Kaspersky Password Manager's password generator had cryptographic weaknesses that could allow attackers to predict generated passwords if they knew ce...
May 14, 2021Dell PowerScale OneFS versions 8.1.0 through 9.1.0 have an LDAP Provider vulnerability where it cannot establish TLSv1.2 connections to LDAP servers. ...
Apr 20, 2021This vulnerability affects Brocade Fabric OS and SANnav systems using SSH host keys shorter than 2048 bits, making SSH communications vulnerable to ma...
Jun 9, 2021This vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker with administrative privileges to upload a specially craft...
Apr 11, 2023This vulnerability in USB Pratirodh allows local attackers with administrative privileges to obtain passwords due to weak SHA1 hashing. Attackers coul...
Mar 6, 2024This vulnerability allows unauthenticated attackers in an on-path position to read and modify data transmitted between legitimate clients and affected...
Aug 13, 2024Apache Spark versions before 3.4.4, 3.5.2, and 4.0.0 use an insecure default cipher (AES/CTR/NoPadding) for RPC encryption when spark.network.crypto.e...
Oct 15, 2025CVE-2025-45769 involves weak encryption in php-jwt v6.11.0 due to insufficient key length validation, potentially allowing attackers to forge or tampe...
Jul 31, 2025This vulnerability allows attackers to delete arbitrary files on affected GL-iNet router devices by intercepting HTTP requests and manipulating the fi...
Oct 24, 2024HCL DRYiCE Optibot Reset Station uses insecure encryption for security questions, allowing attackers with database access to potentially decrypt store...
May 28, 2024SolarWinds Network Configuration Manager (NCM) exposes encrypted password fields through the SolarWinds Information Service (SWIS) to authenticated us...
Oct 10, 2022IBM Security QRadar EDR and ReaQta use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects organiz...
Feb 17, 2026CVE-2024-37034 is an authentication bypass vulnerability in Couchbase Server where credentials may not be properly negotiated with SCRAM-SHA encryptio...
Jul 26, 2024About CWE-326 (CWE-326)
Our database tracks 58 CVEs classified as CWE-326, with 4 rated critical and 38 rated high severity. The average CVSS score for CWE-326 vulnerabilities is 7.2.
External reference: View CWE-326 on MITRE CWE →
Monitor CWE-326 Vulnerabilities
Get alerted when new CWE-326 CVEs affect your infrastructure.
Start Monitoring Free