CWE-326: CWE-326
Yearly Trend
Top Affected Vendors
All CWE-326 CVEs (64)
CVE-2021-42216 is a critical cryptographic vulnerability in AnonAddy email forwarding service that allows attackers to bypass email verification and p...
Dec 15, 2021CVE-2020-14517 is a critical vulnerability in CodeMeter's protocol encryption that can be easily broken, allowing attackers to remotely communicate wi...
Sep 16, 2020CVE-2025-45765 is a weak encryption vulnerability in ruby-jwt v3.0.0.beta1 that allows attackers to potentially forge or tamper with JWT tokens due to...
Aug 7, 2025Brocade ASCG versions before 3.3.0 use medium-strength cryptography algorithms on internal ports 9000 and 8036, allowing attackers to potentially decr...
Jul 17, 2025Apache Linkis versions up to 1.3.1 use a default authentication token that is too simple and predictable, allowing attackers to easily guess or obtain...
Apr 10, 2023A flaw in LibreOffice's password storage system weakens encryption from 128-bit to 43-bit entropy, making stored web connection passwords vulnerable t...
Jul 25, 2022This vulnerability allows attackers who capture network traffic to crack passwords on affected NETGEAR switches by exploiting weak hashing in the NSDP...
Mar 10, 2021This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...
Jun 23, 2023This vulnerability allows attackers to intercept or manipulate communications between NetIQ Advanced Authentication clients and servers by exploiting ...
Aug 28, 2024This vulnerability in FIWARE Keyrock allows attackers to predict password reset tokens due to insufficient randomness. Attackers can take over any use...
Aug 12, 2024This CVE describes vulnerabilities in Aqara Hub firmware update processes that allow attackers to install malicious firmware without proper signature ...
Dec 10, 2025This vulnerability in the Bulletproofs zero-knowledge proof implementation allows attackers to forge proofs by manipulating the Fiat-Shamir transforma...
Apr 21, 2022CVE-2024-28860 is a cryptographic vulnerability in Cilium's IPsec transparent encryption that allows man-in-the-middle attackers to perform chosen pla...
Mar 27, 2024This vulnerability allows malicious Android apps to bypass background launch restrictions, enabling them to start activities without user interaction....
Jul 13, 2023This vulnerability in Android's AccessibilityService allows malicious apps to hide themselves from the user interface due to a logic error. This enabl...
May 15, 2023This vulnerability involves weak SSH server configuration in the MU320E device that doesn't follow security best practices, potentially weakening SSH ...
Mar 25, 2021Dell Data Protection Advisor versions 19.9 contain an inadequate encryption strength vulnerability (CWE-326). A low-privileged attacker with remote ac...
May 29, 2024This vulnerability in Jervis (a library for Jenkins pipeline scripts) uses a weak key derivation method where the same password always produces the sa...
Jan 13, 2026This TLS 1.3 vulnerability allows malicious servers to bypass perfect forward secrecy (PFS) requirements when using pre-shared keys (PSK). Clients may...
Nov 21, 2025This vulnerability affects Siemens APOGEE PXC and TALON TC building automation controllers using weak hard-coded encryption keys. Attackers can decryp...
Feb 11, 2025Portainer before version 2.20.2 uses an improper encryption algorithm in its AesEncrypt function, potentially allowing attackers to decrypt sensitive ...
Oct 2, 2024OpenSlides 4.0.15 uses a weak hashing algorithm to store user passwords, making them vulnerable to offline cracking attacks. This affects all OpenSlid...
Sep 25, 2024Apache Linkis versions up to 1.5.0 use a cryptographically weak random string generator (Commons Lang's RandomStringUtils) for Py4j token generation i...
Sep 25, 2024CVE-2024-32758 is a cryptographic weakness in exacqVision video management systems where client-server communication uses insufficient key length duri...
Aug 1, 2024The encrypt() function in Ninja Core v7.0.0 uses a weak cryptographic algorithm, potentially allowing attackers to decrypt sensitive information. This...
Jun 6, 2024CVE-2024-29950 is a cryptographic vulnerability in Brocade SANnav's FileTransfer class that uses the deprecated ssh-rsa signature scheme with SHA-1 ha...
Apr 17, 2024This vulnerability in upydev's keygen.py module allows attackers to decrypt sensitive information due to weak encryption padding. It affects systems r...
Nov 20, 2023CVE-2023-44690 is an inadequate encryption strength vulnerability in mycli 1.27.0 that allows attackers to decrypt sensitive configuration data. This ...
Oct 19, 2023This vulnerability allows 5G SMS messages to be sent without encryption in VPN environments, potentially exposing message contents to interception. It...
Sep 27, 2023This vulnerability allows attackers to gain root access to Tenda CP3 IP cameras via TELNET or UART using hard-coded default credentials with weak encr...
May 10, 2023This vulnerability in Samsung Flow for Android allows attackers on the same network to decrypt encrypted messages or inject malicious commands due to ...
Feb 9, 2023IBM Security Access Manager Appliance uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects IBM...
Jul 8, 2022IBM Spectrum Scale versions 5.1.0 through 5.1.3.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This ...
May 3, 2022This vulnerability allows attackers to break the encryption in MDT AutoSave software versions prior to v6.02.06, potentially gaining unauthorized acce...
Apr 1, 2022CVE-2022-24318 is an encryption weakness vulnerability in Schneider Electric's SCADA systems that allows non-encrypted communication between outdated ...
Feb 9, 2022CVE-2021-20400 is a cryptographic weakness vulnerability in IBM QRadar SIEM where the software uses weaker-than-expected encryption algorithms. This a...
Dec 1, 2021CVE-2021-44150 is a cryptographic weakness vulnerability in tusdotnet client versions through 2.5.0 that uses SHA-1 for file content verification. Thi...
Nov 22, 2021IBM Tivoli Key Lifecycle Manager versions 3.0 through 4.1 use weak cryptographic algorithms that could allow attackers to decrypt sensitive informatio...
Nov 15, 2021IBM Cloud Pak for Applications 4.3 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects organi...
Jul 13, 2021Emerson Rosemount X-STREAM Gas Analyzers use weak encryption for sensitive data storage, allowing attackers to potentially decrypt and obtain credenti...
May 20, 2021Kaspersky Password Manager's password generator had cryptographic weaknesses that could allow attackers to predict generated passwords if they knew ce...
May 14, 2021Dell PowerScale OneFS versions 8.1.0 through 9.1.0 have an LDAP Provider vulnerability where it cannot establish TLSv1.2 connections to LDAP servers. ...
Apr 20, 2021Psyprax versions before 3.2.2 store encrypted data passwords in the database using weak obfuscation that can be easily reversed. This allows attackers...
Feb 5, 2021This vulnerability in 1C:Enterprise 8 web server exposes base64-encoded credentials in URL parameters, allowing attackers to intercept authentication ...
Jan 13, 2021This vulnerability in the AES encryption module for Drupal allows attackers to decrypt sensitive data protected by the module. It affects Drupal sites...
Jan 1, 2021This vulnerability affects Brocade Fabric OS and SANnav systems using SSH host keys shorter than 2048 bits, making SSH communications vulnerable to ma...
Jun 9, 2021This vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker with administrative privileges to upload a specially craft...
Apr 11, 2023This vulnerability in USB Pratirodh allows local attackers with administrative privileges to obtain passwords due to weak SHA1 hashing. Attackers coul...
Mar 6, 2024This vulnerability allows unauthenticated attackers in an on-path position to read and modify data transmitted between legitimate clients and affected...
Aug 13, 2024Apache Spark versions before 3.4.4, 3.5.2, and 4.0.0 use an insecure default cipher (AES/CTR/NoPadding) for RPC encryption when spark.network.crypto.e...
Oct 15, 2025About CWE-326 (CWE-326)
Our database tracks 64 CVEs classified as CWE-326, with 5 rated critical and 43 rated high severity. The average CVSS score for CWE-326 vulnerabilities is 7.3.
External reference: View CWE-326 on MITRE CWE →
Monitor CWE-326 Vulnerabilities
Get alerted when new CWE-326 CVEs affect your infrastructure.
Start Monitoring Free