Cryptanalysis of Cellular Encryption |
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
|
Signature Spoofing by Improper Validation |
CWE-295
|
Improper Certificate Validation
|
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
CWE-347
|
Improper Verification of Cryptographic Signature
|
|
Rooting SIM Cards |
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
|
Creating a Rogue Certification Authority Certificate |
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-295
|
Improper Certificate Validation
|
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
|
Encryption Brute Forcing |
CWE-326
|
Inadequate Encryption Strength
|
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
CWE-693
|
Protection Mechanism Failure
|
CWE-719
|
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage
|
|
Signature Spoof |
CWE-20
|
Improper Input Validation
|
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
|
Cryptanalysis |
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm
|
CWE-1240
|
Use of a Risky Cryptographic Primitive
|
CWE-1241
|
Use of Predictable Algorithm in Random Number Generator
|
CWE-1279
|
Cryptographic Operations are run Before Supporting Units are Ready
|
|