CWE-327: CWE-327
Yearly Trend
Top Affected Vendors
All CWE-327 CVEs (146)
This vulnerability in VNC authentication allows attackers to capture challenge-response pairs from unencrypted network traffic and attempt to derive t...
Jul 3, 2025This vulnerability involves a service supporting deprecated and unsafe TLS versions, potentially allowing attackers to intercept or manipulate sensiti...
Jun 12, 2025Dell RecoverPoint for VMs versions 6.0.x contain a broken cryptographic algorithm vulnerability in SSH that allows unauthenticated remote attackers to...
Dec 13, 2024Brocade SANnav management software versions before 2.2.2 support weak key exchange algorithms on multiple ports, allowing attackers to potentially dec...
Nov 21, 2024This vulnerability affects Siemens SmartClient modules by supporting insecure TLS 1.0 and 1.1 protocols, allowing man-in-the-middle attacks that could...
Aug 12, 2025This vulnerability is an elliptic curve cryptography implementation flaw in illumos that causes incorrect point addition results. A man-in-the-middle ...
Jan 27, 2025This vulnerability involves the use of a broken cryptographic algorithm in Schneider Electric devices, allowing attackers to cause denial of service, ...
Jun 12, 2024This vulnerability allows attackers to decrypt TLS/SSL traffic by exploiting the use of static key ciphers in Juniper Junos Space servers. It affects ...
Jan 15, 2026IBM Concert versions 1.0.0 through 2.0.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This affects o...
Nov 24, 2025IBM Concert versions 1.0.0 through 2.0.0 fail to properly enable HTTP Strict-Transport-Security (HSTS), allowing man-in-the-middle attackers to interc...
Nov 20, 2025Dell PowerScale OneFS contains a broken cryptographic algorithm vulnerability that allows unauthenticated remote attackers to potentially access sensi...
Nov 10, 2025IBM Security Verify Information Queue versions 10.0.5 through 10.0.8 use weak cryptographic algorithms that could allow attackers to decrypt sensitive...
Sep 10, 2025IBM Concert Software versions 1.0.0 through 1.1.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. This ...
Sep 1, 2025IBM Concert Software versions 1.0.0 through 1.1.0 fail to properly enable HTTP Strict Transport Security (HSTS), allowing attackers to intercept unenc...
Sep 1, 2025IBM Storage Defender - Resiliency Service versions 2.0.0 through 2.0.12 use weak cryptographic algorithms, potentially allowing attackers to decrypt s...
Apr 16, 2025IBM Aspera Console versions 3.4.0 through 3.4.4 use weak cryptographic algorithms that could allow attackers to decrypt sensitive data. This affects o...
Apr 14, 2025IBM Security QRadar 3.12 EDR uses weak cryptographic algorithms that could allow attackers to decrypt stored credential information. This affects orga...
Mar 14, 2025IBM Cognos Controller and IBM Controller Rich Client use weak cryptographic algorithms that could allow attackers to decrypt sensitive information. Th...
Feb 19, 2025IBM Storage Protect for Virtual Environments and Backup-Archive Client versions 8.1.0.0 through 8.1.23.0 use weak cryptographic algorithms that could ...
Jan 27, 2025This vulnerability in IBM DevOps Velocity and UrbanCode Velocity uses weak cryptographic algorithms that could allow attackers to decrypt sensitive in...
Jan 20, 2025This vulnerability in IBM Concert Software allows attackers to intercept unencrypted HTTP traffic due to missing HTTP Strict Transport Security (HSTS)...
Jan 7, 2025IBM Engineering Lifecycle Optimization - Publishing versions 7.0.2 and 7.0.3 use weak cryptographic algorithms, potentially allowing attackers to decr...
Jan 4, 2025IBM Sterling Connect:Direct Web Services uses weak cryptographic algorithms that could allow attackers to decrypt sensitive data transmitted by the ap...
Aug 22, 2024Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 use broken or risky cryptographic algorithms, allowing unprivileged network attackers to potent...
Jul 2, 2024Dell PowerProtect Data Domain systems using weak cryptographic algorithms are vulnerable to man-in-the-middle attacks. Remote unauthenticated attacker...
Jun 26, 2024IBM Cognos Controller versions 10.4.1, 10.4.2, and 11.0.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive informatio...
May 3, 2024IBM Cognos Controller versions 10.4.1, 10.4.2, and 11.0.0 use weak cryptographic algorithms that could allow attackers to decrypt sensitive informatio...
May 3, 2024This vulnerability involves the use of a weak cryptographic algorithm in Windows Kerberos authentication, allowing an authenticated attacker with loca...
Jan 13, 2026libtpms versions 0.10.0 and 0.10.1 have a cryptographic vulnerability where the library incorrectly returns the initial IV instead of the last IV when...
Jan 2, 2026This vulnerability allows attackers to impersonate legitimate Wi-Fi access points and inject malicious data into wireless transmissions, bypassing cry...
Mar 4, 2026This vulnerability in the AWS SDK for PHP allows an attacker with write access to an S3 bucket to manipulate encrypted data keys, potentially causing ...
Dec 17, 2025This vulnerability in the AWS SDK for Ruby allows an attacker with write access to an S3 bucket to manipulate encrypted data keys, potentially causing...
Dec 17, 2025This vulnerability in Amazon S3 Encryption Client for Java allows users with write access to an S3 bucket to manipulate encrypted data keys stored in ...
Dec 17, 2025This vulnerability in the Amazon S3 Encryption Client for Go allows attackers with write access to an S3 bucket to manipulate encrypted data keys, pot...
Dec 17, 2025This vulnerability in the AWS SDK for C++ allows an attacker with write access to an S3 bucket to manipulate encrypted data keys stored in instruction...
Dec 17, 2025This vulnerability in Amazon S3 Encryption Client for .NET allows users with write access to an S3 bucket to replace encrypted data keys with maliciou...
Dec 17, 2025Dell PowerProtect Data Domain systems running affected DD OS versions contain a broken cryptographic algorithm vulnerability. Unauthenticated remote a...
Oct 7, 2025Dell PowerProtect Data Domain systems using vulnerable DD OS versions contain a broken cryptographic algorithm in authentication mechanisms. An unauth...
Oct 7, 2025Brocade SANnav versions before 2.3.1b enable weak TLS ciphers on ports 443 and 18082, allowing attackers to intercept and read network traffic contain...
Feb 15, 2025IBM Aspera faspio Gateway 1.3.6 uses weak cryptographic algorithms that could allow attackers to decrypt sensitive data transmitted through the gatewa...
Mar 3, 2026This vulnerability affects multiple RUGGEDCOM industrial networking devices that support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The...
Jul 8, 2025Dell PowerScale OneFS versions before 9.11.0.0 use broken or risky cryptographic algorithms, allowing high-privileged remote attackers to potentially ...
Jul 21, 2025This vulnerability in Matrix libolm allows attackers to create different but valid signatures for the same message due to insufficient Ed25519 signatu...
Aug 22, 2024This vulnerability involves the use of broken or risky cryptographic algorithms in Desktop Alert PingAlert's Application Server, potentially allowing ...
Nov 14, 2025This vulnerability in Tenda AX9 routers allows attackers to exploit weak hash functions in the firmware update mechanism via the httpd component. Atta...
Dec 13, 2025A vulnerability in TP-Link TL-WR820N routers allows attackers on the same network to intercept and decrypt SSH traffic due to weak cryptographic algor...
Dec 29, 2025About CWE-327 (CWE-327)
Our database tracks 146 CVEs classified as CWE-327, with 24 rated critical and 75 rated high severity. The average CVSS score for CWE-327 vulnerabilities is 7.3.
External reference: View CWE-327 on MITRE CWE →
Monitor CWE-327 Vulnerabilities
Get alerted when new CWE-327 CVEs affect your infrastructure.
Start Monitoring Free