CWE-327: CWE-327
Yearly Trend
Top Affected Vendors
All CWE-327 CVEs (145)
This vulnerability in YesWiki allows attackers to recover password reset keys due to weak cryptography and a hard-coded salt. Attackers can then reset...
Oct 31, 2024This vulnerability in N3uron Web User Interface v1.21.7-240207.1047 allows remote attackers to escalate privileges by exploiting weak client-side pass...
Jan 29, 2026This CVE describes a broken cryptographic algorithm vulnerability in Salesforce Marketing Cloud Engagement that allows attackers to manipulate web ser...
Jan 24, 2026This vulnerability allows attackers to perform man-in-the-middle attacks against SSH connections to Brocade SANnav OVA appliances by exploiting the us...
Feb 15, 2025CVE-2022-3365 allows remote attackers to execute arbitrary operating system commands on systems running Remote Mouse Server due to weak encryption and...
Jan 28, 2025A vulnerability in Open Quantum Safe liboqs v10.0 allows remote attackers to escalate privileges via a fault injection attack on the crypto_sign_signa...
May 24, 2024This vulnerability allows attackers to bypass cryptographic signature verification during firmware updates on Korenix JetNet industrial networking dev...
Jan 9, 2024CVE-2023-34039 allows attackers to bypass SSH authentication in VMware Aria Operations for Networks due to weak cryptographic key generation. This ena...
Aug 29, 2023SonicWall GMS and Analytics use an outdated, weak encryption algorithm (TEA) with a hardcoded key to protect sensitive data. This allows attackers to ...
Jul 13, 2023This vulnerability in HHVM allows attackers to intercept or manipulate encrypted network communications by forcing the use of deprecated TLS 1.0 proto...
May 10, 2023CVE-2022-30273 is a critical vulnerability in Motorola MDLC protocol that allows attackers to decrypt and manipulate encrypted communications when Leg...
Jul 26, 2022This CVE identifies that AWS CloudFront's TLSv1.2_2019 security policy includes CBC-mode ciphers (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_...
Aug 12, 2021This vulnerability in Schneider Electric homeLYnk and spaceLYnk systems allows attackers to brute-force credentials due to weak cryptographic algorith...
May 26, 2021Clatter versions before 2.2.0 have a protocol compliance vulnerability where post-quantum handshake patterns violate the PSK validity rule, allowing P...
Jan 28, 2026A cryptanalytic vulnerability in Altcha's Proof-of-Work obfuscation mode allows attackers to recover the nonce in constant time, bypassing the intende...
Dec 8, 2025This vulnerability allows unauthenticated remote attackers to intercept and manipulate encrypted communications between Com-Server and connected syste...
Apr 28, 2025A bit-flipping vulnerability in cookie-encrypter v1.0.1 allows attackers to manipulate encrypted cookie values to bypass authentication or escalate pr...
Dec 9, 2024CVE-2024-41270 is a TLS vulnerability in Gorush v1.18.4 that allows attackers to intercept and manipulate data transmitted to the server due to the us...
Aug 6, 2024CVE-2023-51839 is a cryptographic vulnerability in DeviceFarmer STF (Smartphone Test Farm) version 3.6.6 that uses broken or risky cryptographic algor...
Jan 29, 2024This vulnerability in bcoin version 2.2.0 allows remote attackers to extract sensitive information through weak hashing algorithms in the faye-websock...
Dec 21, 2023CVE-2022-34632 is an insufficient cryptography vulnerability in Rocket-Chip's RocketCore.scala component that allows attackers to bypass cryptographic...
Jul 18, 2022This vulnerability in Linaro OP-TEE allows attackers to cause crashes that could leak sensitive information by calling cryptographic functions with in...
Aug 11, 2021This vulnerability in ZTE ZXIPTV products involves improper implementation of cryptographic algorithms, allowing remote attackers to perform account c...
Sep 1, 2020This vulnerability allows unprivileged pods in different Kubernetes namespaces to connect to Argo CD's Redis server on port 6379, potentially leading ...
May 21, 2024A vulnerability in beego's file caching mechanism allows remote attackers to write arbitrary files to the server filesystem via path traversal. This a...
Jul 31, 2024This vulnerability affects multiple NETGEAR routers and extenders that use weak cryptography implementations, potentially allowing attackers to decryp...
Dec 26, 2021This vulnerability allows attackers with read access to Edge Project or Edge Offline Cache files to extract weakly hashed passwords and brute-force th...
Nov 15, 2025This vulnerability in Smadar SPS involves the use of broken or risky cryptographic algorithms, potentially allowing attackers to decrypt sensitive dat...
Dec 30, 2024This vulnerability in Parsec's RustCrypto backend allows man-in-the-middle attackers to bypass cryptographic authentication by providing weak order po...
Jan 29, 2026This CVE describes an insecure RSA implementation in Click Plus PLC firmware version 3.60, allowing attackers to potentially decrypt sensitive data or...
Sep 23, 2025This vulnerability affects Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs using S0 security that use a known, shared network key of ...
Feb 4, 2022This vulnerability in Oracle Database's Advanced Networking Option allows attackers to bypass network encryption protections and potentially compromis...
Jul 21, 2021HCL DRYiCE MyXalytics uses a broken cryptographic algorithm for encryption, potentially allowing attackers to decrypt sensitive information. This affe...
Jan 3, 2024This vulnerability in GnuBoard5 uses weak cryptographic algorithms that allow attackers to decrypt sensitive user information. Attackers can derive em...
Apr 11, 2022CVE-2024-39583 is a cryptographic vulnerability in Dell PowerScale InsightIQ versions 5.0 through 5.1 that allows unauthenticated remote attackers to ...
Sep 10, 2024This vulnerability allows attackers to elevate privileges on Windows systems by exploiting a flaw in the Kerberos authentication protocol. Attackers c...
Apr 11, 2023Dell PowerScale OneFS versions 8.2.x through 9.2.x contain a broken or risky cryptographic algorithm vulnerability. A remote unprivileged attacker cou...
Jun 28, 2022Dell PowerScale OneFS versions 8.2.x through 9.2.x contain weak cryptographic algorithms that could allow a remote attacker without privileges to gain...
Apr 8, 2022Dell EMC InsightIQ versions before 4.1.4 use weak cryptographic algorithms in SSH, allowing unauthenticated attackers to bypass authentication and gai...
Oct 1, 2021This vulnerability in Nettle cryptographic library allows attackers to forge digital signatures by exploiting incorrect elliptic curve multiplication ...
Apr 5, 2021CVE-2023-21399 is a cryptographic bypass vulnerability in Android that allows local privilege escalation without user interaction. Attackers can explo...
Jul 13, 2023OpenClaw versions before 2026.2.15 use deprecated SHA-1 hashing for sandbox identifier cache keys, making them vulnerable to collision attacks. Attack...
Mar 5, 2026Yokogawa FAST/TOOLS industrial control system software uses weak cryptographic algorithms, potentially allowing attackers to decrypt web server commun...
Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS software allows attackers to potentially decrypt communications by exploiting support for outdated SSL/TLS...
Feb 9, 2026Jervis versions before 2.2 use vulnerable PKCS1Encoding for RSA encryption, making them susceptible to Bleichenbacher padding oracle attacks. This cou...
Jan 13, 2026Jervis versions before 2.2 use deterministic AES initialization vectors derived from passphrases, making encrypted data vulnerable to cryptographic at...
Jan 13, 2026Jervis versions before 2.2 incorrectly use 32-character padding instead of 64-character padding for SHA-256 hashes, which could lead to hash collision...
Jan 13, 2026A cryptography vulnerability in Kentico Xperience allows attackers to manipulate URL hash values, potentially enabling unauthorized actions or data ac...
Dec 18, 2025This vulnerability in Apache StreamPark uses weak encryption (AES-ECB mode) and a weak random number generator for encrypting sensitive data like JWT ...
Dec 12, 2025This vulnerability allows attackers to crack MD5-hashed passwords obtained through various means like cloud service exploitation or TLS downgrade atta...
Dec 10, 2025About CWE-327 (CWE-327)
Our database tracks 145 CVEs classified as CWE-327, with 24 rated critical and 74 rated high severity. The average CVSS score for CWE-327 vulnerabilities is 7.3.
External reference: View CWE-327 on MITRE CWE →
Monitor CWE-327 Vulnerabilities
Get alerted when new CWE-327 CVEs affect your infrastructure.
Start Monitoring Free