SYM_JAVA_0123 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of a Broken or Risky Cryptographic Algorithm

Property Value
Language java
Severity low
CWE CWE-327: Use of a Broken or Risky Cryptographic Algorithm
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level Low
Impact Level Low
Likelihood Level Low

Description

Implementing your own cryptographic message digest (hash) algorithms is risky because it's easy to introduce subtle flaws that weaken security. Instead, always use well-tested, standard library implementations like SHA-256.

Impact

If a custom message digest contains mistakes, attackers could break the hash, forge data, or access sensitive information. This can lead to data breaches, loss of integrity, and compromise of authentication or encryption features in your application.