CAPEC Related Weakness
Signature Spoof
CWE-20 Improper Input Validation
CWE-290 Authentication Bypass by Spoofing
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Cryptanalysis of Cellular Encryption
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Cryptanalysis
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
CWE-1240 Use of a Risky Cryptographic Primitive
CWE-1241 Use of Predictable Algorithm in Random Number Generator
CWE-1279 Cryptographic Operations are run Before Supporting Units are Ready
Encryption Brute Forcing
CWE-326 Inadequate Encryption Strength
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
CWE-693 Protection Mechanism Failure
CWE-719 OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage
Creating a Rogue Certification Authority Certificate
CWE-290 Authentication Bypass by Spoofing
CWE-295 Improper Certificate Validation
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Rooting SIM Cards
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Signature Spoofing by Improper Validation
CWE-295 Improper Certificate Validation
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
CWE-347 Improper Verification of Cryptographic Signature