CWE-327: CWE-327
Yearly Trend
Top Affected Vendors
All CWE-327 CVEs (146)
This vulnerability in AndSoft's e-TMS v25.03 uses the MD5 hash algorithm for password encryption, which is cryptographically broken and vulnerable to ...
Oct 2, 2025The Emissary workflow engine's ChecksumCalculator class uses weak cryptographic algorithms (SHA-1, CRC32, SSDEEP) that are no longer considered secure...
Mar 5, 2025AudioCodes Mediant SBC devices before version 7.40A.501.841 use weak password obfuscation in configuration exports, allowing attackers with access to ...
Feb 7, 2025ECOVACS robot lawnmowers and vacuums use a predictable symmetric key for firmware decryption, allowing attackers to create and install malicious firmw...
Jan 23, 2025This vulnerability affects certain PLANET Technology switch models that use obsolete cryptographic algorithms in their SNMPv3 implementation. Attacker...
Sep 30, 2024This vulnerability allows attackers to bypass Windows Cryptographic Services security features, potentially enabling them to circumvent digital signat...
Jul 9, 2024The TVS Connect mobile application insecurely handles RSA key pairs, potentially allowing attackers to decrypt sensitive information transmitted by th...
Jun 21, 2024MeshCentral 1.1.16 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive data or bypass authentication. This affects all ...
Feb 2, 2024CVE-2023-50481 is a cryptographic vulnerability in blinksocks 3.3.8 that allows remote attackers to decrypt sensitive information due to weak encrypti...
Dec 21, 2023Broadcom RAID Controller web interface uses insecure default TLS configurations that support obsolete and vulnerable TLS protocols. This allows attack...
Aug 15, 2023This vulnerability in IBM Runtime Environment Java Technology Edition's IBMJCEPlus and JSSE components could expose sensitive information due to crypt...
Apr 29, 2023This vulnerability affects Rocket Software UniData and UniVerse database systems using weak encryption for network communications and password transmi...
Mar 29, 2023This vulnerability in TP-Link TL-WR940N V6 routers allows attackers to potentially crack admin passwords due to the use of weak MD5 hashing for authen...
Feb 22, 2023This vulnerability affects the LTI 1.3 Tool Library for PHP, where insufficient cryptographic complexity in random nonce generation could allow attack...
Jul 15, 2022This CVE describes a cryptographic vulnerability in certain Verbatim encrypted storage drives where AES-256 encryption uses insecure ECB mode instead ...
Jun 8, 2022CVE-2022-29249 is a vulnerability in JavaEZ library version 1.6 that allows unauthorized actors to force decryption of locked text, potentially exposi...
May 24, 2022IBM Cloud Pak System versions 2.3.0 through 2.3.3.3 Interim Fix 1 use weak cryptographic algorithms, allowing attackers to decrypt sensitive informati...
May 9, 2022IBM UrbanCode Deploy 7.1.1.2 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information stored or transmitted by t...
Apr 29, 2022IBM Security Guardium versions 10.5 and 11.3 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information stored or t...
Apr 19, 2022Dell PowerScale OneFS version 9.3.0 uses a broken or risky cryptographic algorithm, allowing unprivileged network attackers to potentially decrypt sen...
Apr 12, 2022This vulnerability in Philips Vue PACS involves the use of broken cryptographic algorithms, which could allow attackers to decrypt sensitive medical i...
Apr 1, 2022This vulnerability in IBM UrbanCode Deploy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information stored or tr...
Apr 1, 2022This vulnerability in BigFix Compliance allows attackers to decrypt TLS-encrypted network traffic when TLS-RSA cipher suites are enabled without TLS 2...
Mar 4, 2022IBM Security Verify versions 10.0.0 through 10.0.2.0 use weak cryptographic algorithms, allowing attackers to decrypt sensitive information stored or ...
Jan 10, 2022CVE-2021-42583 is a cryptographic vulnerability in Maddy email server software where weak or broken cryptographic algorithms could expose sensitive au...
Dec 28, 2021CVE-2017-2488 is a cryptographic weakness in Apple Remote Desktop's authentication protocol that allowed attackers to capture cleartext passwords duri...
Dec 23, 2021This vulnerability in Mbed TLS allows policy bypass or oracle-based decryption attacks when untrusted applications can access output buffer memory loc...
Dec 21, 2021IBM Spectrum Copy Data Management versions 2.2.13 and earlier use weak cryptographic algorithms that could allow attackers to decrypt sensitive inform...
Dec 13, 2021EnroCrypt versions before 1.1.4 use the insecure MD5 hashing algorithm, which can lead to hash collisions and password cracking. This affects develope...
Nov 8, 2021Rucky versions 2.2 and earlier (release builds) and 425 and earlier (nightly builds) use weak RSA/ECB/PKCS1Padding encryption, which could allow attac...
Sep 27, 2021IBM QRadar SIEM versions 7.3 and 7.4 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects organ...
Sep 15, 2021This vulnerability in CyberArk Credential Provider allows attackers to decrypt credential files due to insufficient encryption key space. Attackers ca...
Sep 2, 2021This vulnerability in IBM Sterling Secure Proxy uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information transmi...
Aug 30, 2021IBM Security SOAR uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information stored or transmitted by the system. ...
Aug 23, 2021IBM QRadar SIEM versions 7.3.0-7.3.3 Patch 8 and 7.4.0-7.4.3 GA use weak cryptographic algorithms, allowing attackers to decrypt sensitive information...
Jul 26, 2021IBM Security Verify Access Docker 10.0.0 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects ...
Jul 15, 2021IBM Guardium Data Encryption (GDE) uses weak cryptographic algorithms that could allow attackers to decrypt sensitive encrypted data. This affects GDE...
Jul 7, 2021CVE-2021-20566 is a cryptographic weakness vulnerability in IBM Resilient SOAR V38.0 that allows attackers to decrypt sensitive information due to the...
Jun 16, 2021CVE-2020-26515 is an authentication bypass vulnerability in Intland codeBeamer ALM where the 'remember-me' cookie uses NULL encryption, allowing attac...
Jun 8, 2021IBM Spectrum Protect Plus versions 10.1.0 through 10.1.7 use weak cryptographic algorithms, allowing attackers to decrypt sensitive information. This ...
Apr 26, 2021CVE-2020-4965 is a cryptographic weakness vulnerability in IBM Jazz Team Server products where weaker-than-expected encryption algorithms allow attack...
Apr 12, 2021CVE-2019-14852 is a cryptographic vulnerability in 3scale's APIcast gateway that allows TLS 1.0 protocol usage, enabling attackers to potentially decr...
Mar 18, 2021This vulnerability affects Siemens RUGGEDCOM ROX industrial routers by supporting insecure TLS 1.0 protocol in their webserver. Attackers can perform ...
Jul 11, 2023SanDisk PrivateAccess versions before 6.4.9 support outdated TLS 1.0 and 1.1 protocols, which are vulnerable to man-in-the-middle attacks. This allows...
Mar 24, 2023This vulnerability in PyJWT allows attackers to forge JWT tokens by algorithm confusion when applications use the default algorithm list. It affects a...
May 24, 2022A cryptographic vulnerability in HPE Aruba EdgeConnect SD-WAN Gateways allows authenticated remote attackers to gain shell access and execute arbitrar...
Sep 16, 2025Poco v1.14.1-release contains weak encryption implementations that could allow attackers to decrypt sensitive data if applications don't properly conf...
Aug 6, 2025CVE-2025-45767 involves weak encryption in jose v6.0.10, potentially allowing attackers to decrypt or forge JWT tokens. This affects applications usin...
Aug 1, 2025This vulnerability affects OSD Bare Metal Servers using weak cryptographic algorithms, potentially allowing attackers to decrypt sensitive data or byp...
Jun 22, 2023DuckDB's block-based encryption implementation contains multiple cryptographic flaws that could allow attackers to bypass encryption, compromise keys,...
Nov 12, 2025About CWE-327 (CWE-327)
Our database tracks 146 CVEs classified as CWE-327, with 24 rated critical and 75 rated high severity. The average CVSS score for CWE-327 vulnerabilities is 7.3.
External reference: View CWE-327 on MITRE CWE →
Monitor CWE-327 Vulnerabilities
Get alerted when new CWE-327 CVEs affect your infrastructure.
Start Monitoring Free