CWE-327: CWE-327

145
Total CVEs
24
Critical
74
High
7.3
Avg CVSS

Yearly Trend

2026
15
2025
49
2024
24
2023
14
2022
18

Top Affected Vendors

1 Ibm 33
2 Dell 12
3 Broadcom 4
4 Samrocketman 3
5 Fedoraproject 3
6 Microsoft 3
7 Hcltech 3
8 Schneider Electric 2
9 Yokogawa 2
10 Siemens 2

All CWE-327 CVEs (145)

CVE-2024-51478
9.9

This vulnerability in YesWiki allows attackers to recover password reset keys due to weak cryptography and a hard-coded salt. Attackers can then reset...

Oct 31, 2024
CVE-2025-69929
9.8

This vulnerability in N3uron Web User Interface v1.21.7-240207.1047 allows remote attackers to escalate privileges by exploiting weak client-side pass...

Jan 29, 2026
CVE-2026-22585
9.8

This CVE describes a broken cryptographic algorithm vulnerability in Salesforce Marketing Cloud Engagement that allows attackers to manipulate web ser...

Jan 24, 2026
CVE-2024-4282
9.8

This vulnerability allows attackers to perform man-in-the-middle attacks against SSH connections to Brocade SANnav OVA appliances by exploiting the us...

Feb 15, 2025
CVE-2022-3365
EPSS 57.9% 9.8

CVE-2022-3365 allows remote attackers to execute arbitrary operating system commands on systems running Remote Mouse Server due to weak encryption and...

Jan 28, 2025
CVE-2024-31510
9.8

A vulnerability in Open Quantum Safe liboqs v10.0 allows remote attackers to escalate privileges via a fault injection attack on the crypto_sign_signa...

May 24, 2024
CVE-2023-5347
9.8

This vulnerability allows attackers to bypass cryptographic signature verification during firmware updates on Korenix JetNet industrial networking dev...

Jan 9, 2024
CVE-2023-34039
9.8

CVE-2023-34039 allows attackers to bypass SSH authentication in VMware Aria Operations for Networks due to weak cryptographic key generation. This ena...

Aug 29, 2023
CVE-2023-34130
9.8

SonicWall GMS and Analytics use an outdated, weak encryption algorithm (TEA) with a hardcoded key to protect sensitive data. This allows attackers to ...

Jul 13, 2023
CVE-2022-36937
9.8

This vulnerability in HHVM allows attackers to intercept or manipulate encrypted network communications by forcing the use of deprecated TLS 1.0 proto...

May 10, 2023
CVE-2022-30273
9.8

CVE-2022-30273 is a critical vulnerability in Motorola MDLC protocol that allows attackers to decrypt and manipulate encrypted communications when Leg...

Jul 26, 2022
CVE-2020-36363
9.8

This CVE identifies that AWS CloudFront's TLSv1.2_2019 security policy includes CBC-mode ciphers (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_...

Aug 12, 2021
CVE-2021-22738
9.8

This vulnerability in Schneider Electric homeLYnk and spaceLYnk systems allows attackers to brute-force credentials due to weak cryptographic algorith...

May 26, 2021
CVE-2026-24785
9.1

Clatter versions before 2.2.0 have a protocol compliance vulnerability where post-quantum handshake patterns violate the PSK validity rule, allowing P...

Jan 28, 2026
CVE-2025-65849
9.1

A cryptanalytic vulnerability in Altcha's Proof-of-Work obfuscation mode allows attackers to recover the nonce in constant time, bypassing the intende...

Dec 8, 2025
CVE-2025-3200
9.1

This vulnerability allows unauthenticated remote attackers to intercept and manipulate encrypted communications between Com-Server and connected syste...

Apr 28, 2025
CVE-2024-53441
9.1

A bit-flipping vulnerability in cookie-encrypter v1.0.1 allows attackers to manipulate encrypted cookie values to bypass authentication or escalate pr...

Dec 9, 2024
CVE-2024-41270
9.1

CVE-2024-41270 is a TLS vulnerability in Gorush v1.18.4 that allows attackers to intercept and manipulate data transmitted to the server due to the us...

Aug 6, 2024
CVE-2023-51839
9.1

CVE-2023-51839 is a cryptographic vulnerability in DeviceFarmer STF (Smartphone Test Farm) version 3.6.6 that uses broken or risky cryptographic algor...

Jan 29, 2024
CVE-2023-50475
9.1

This vulnerability in bcoin version 2.2.0 allows remote attackers to extract sensitive information through weak hashing algorithms in the faye-websock...

Dec 21, 2023
CVE-2022-34632
9.1

CVE-2022-34632 is an insufficient cryptography vulnerability in Rocket-Chip's RocketCore.scala component that allows attackers to bypass cryptographic...

Jul 18, 2022
CVE-2019-25052
9.1

This vulnerability in Linaro OP-TEE allows attackers to cause crashes that could leak sensitive information by calling cryptographic functions with in...

Aug 11, 2021
CVE-2020-6874
9.1

This vulnerability in ZTE ZXIPTV products involves improper implementation of cryptographic algorithms, allowing remote attackers to perform account c...

Sep 1, 2020
CVE-2024-31989
9.0

This vulnerability allows unprivileged pods in different Kubernetes namespaces to connect to Argo CD's Redis server on port 6379, potentially leading ...

May 21, 2024
CVE-2024-40465
8.8

A vulnerability in beego's file caching mechanism allows remote attackers to write arbitrary files to the server filesystem via path traversal. This a...

Jul 31, 2024
CVE-2021-45512
8.6

This vulnerability affects multiple NETGEAR routers and extenders that use weak cryptography implementations, potentially allowing attackers to decryp...

Dec 26, 2021
CVE-2025-9317
8.4

This vulnerability allows attackers with read access to Edge Project or Edge Offline Cache files to extract weakly hashed passwords and brute-force th...

Nov 15, 2025
CVE-2024-47921
8.4

This vulnerability in Smadar SPS involves the use of broken or risky cryptographic algorithms, potentially allowing attackers to decrypt sensitive dat...

Dec 30, 2024
CVE-2025-62514
8.3

This vulnerability in Parsec's RustCrypto backend allows man-in-the-middle attackers to bypass cryptographic authentication by providing weak order po...

Jan 29, 2026
CVE-2025-59484
8.3

This CVE describes an insecure RSA implementation in Click Plus PLC firmware version 3.60, allowing attackers to potentially decrypt sensitive data or...

Sep 23, 2025
CVE-2013-20003
8.3

This vulnerability affects Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs using S0 security that use a known, shared network key of ...

Feb 4, 2022
CVE-2021-2351
8.3

This vulnerability in Oracle Database's Advanced Networking Option allows attackers to bypass network encryption protections and potentially compromis...

Jul 21, 2021
CVE-2023-50350
8.2

HCL DRYiCE MyXalytics uses a broken cryptographic algorithm for encryption, potentially allowing attackers to decrypt sensitive information. This affe...

Jan 3, 2024
CVE-2022-1252
8.2

This vulnerability in GnuBoard5 uses weak cryptographic algorithms that allow attackers to decrypt sensitive user information. Attackers can derive em...

Apr 11, 2022
CVE-2024-39583
8.1

CVE-2024-39583 is a cryptographic vulnerability in Dell PowerScale InsightIQ versions 5.0 through 5.1 that allows unauthenticated remote attackers to ...

Sep 10, 2024
CVE-2023-28244
8.1

This vulnerability allows attackers to elevate privileges on Windows systems by exploiting a flaw in the Kerberos authentication protocol. Attackers c...

Apr 11, 2023
CVE-2022-31230
8.1

Dell PowerScale OneFS versions 8.2.x through 9.2.x contain a broken or risky cryptographic algorithm vulnerability. A remote unprivileged attacker cou...

Jun 28, 2022
CVE-2022-26854
8.1

Dell PowerScale OneFS versions 8.2.x through 9.2.x contain weak cryptographic algorithms that could allow a remote attacker without privileges to gain...

Apr 8, 2022
CVE-2021-36298
8.1

Dell EMC InsightIQ versions before 4.1.4 use weak cryptographic algorithms in SSH, allowing unauthenticated attackers to bypass authentication and gai...

Oct 1, 2021
CVE-2021-20305
8.1

This vulnerability in Nettle cryptographic library allows attackers to forge digital signatures by exploiting incorrect elliptic curve multiplication ...

Apr 5, 2021
CVE-2023-21399
7.8

CVE-2023-21399 is a cryptographic bypass vulnerability in Android that allows local privilege escalation without user interaction. Attackers can explo...

Jul 13, 2023
CVE-2026-28479
7.5

OpenClaw versions before 2026.2.15 use deprecated SHA-1 hashing for sandbox identifier cache keys, making them vulnerable to collision attacks. Attack...

Mar 5, 2026
CVE-2025-66597
7.5

Yokogawa FAST/TOOLS industrial control system software uses weak cryptographic algorithms, potentially allowing attackers to decrypt web server commun...

Feb 9, 2026
CVE-2025-66598
7.5

This vulnerability in Yokogawa's FAST/TOOLS software allows attackers to potentially decrypt communications by exploiting support for outdated SSL/TLS...

Feb 9, 2026
CVE-2025-68698
7.5

Jervis versions before 2.2 use vulnerable PKCS1Encoding for RSA encryption, making them susceptible to Bleichenbacher padding oracle attacks. This cou...

Jan 13, 2026
CVE-2025-68701
7.5

Jervis versions before 2.2 use deterministic AES initialization vectors derived from passphrases, making encrypted data vulnerable to cryptographic at...

Jan 13, 2026
CVE-2025-68702
7.5

Jervis versions before 2.2 incorrectly use 32-character padding instead of 64-character padding for SHA-256 hashes, which could lead to hash collision...

Jan 13, 2026
CVE-2021-47712
7.5

A cryptography vulnerability in Kentico Xperience allows attackers to manipulate URL hash values, potentially enabling unauthorized actions or data ac...

Dec 18, 2025
CVE-2025-54981
7.5

This vulnerability in Apache StreamPark uses weak encryption (AES-ECB mode) and a weak random number generator for encrypting sensitive data like JWT ...

Dec 12, 2025
CVE-2025-65831
7.5

This vulnerability allows attackers to crack MD5-hashed passwords obtained through various means like cloud service exploitation or TLS downgrade atta...

Dec 10, 2025

About CWE-327 (CWE-327)

Our database tracks 145 CVEs classified as CWE-327, with 24 rated critical and 74 rated high severity. The average CVSS score for CWE-327 vulnerabilities is 7.3.

External reference: View CWE-327 on MITRE CWE →

Monitor CWE-327 Vulnerabilities

Get alerted when new CWE-327 CVEs affect your infrastructure.

Start Monitoring Free