SYM_JAVA_0023 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of a Broken or Risky Cryptographic Algorithm

Property Value
Language kotlin
Severity medium
CWE CWE-327: Use of a Broken or Risky Cryptographic Algorithm
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level Medium
Impact Level Medium
Likelihood Level Low

Description

The code uses the SHA-1 hashing algorithm, which is no longer secure due to known weaknesses that allow attackers to create hash collisions. Using SHA-1 for cryptographic purposes can lead to compromised data integrity and authentication.

Impact

An attacker could exploit SHA-1's weaknesses to forge digital signatures, tamper with files, or bypass authentication checks, leading to potential data breaches, unauthorized access, or loss of trust in the application's security. This can result in sensitive data exposure and legal or reputational damage.