CWE-327

Use of a Broken or Risky Cryptographic Algorithm

92 CVEs Avg CVSS 6.8 MITRE
12
CRITICAL
33
HIGH
42
MEDIUM
5
LOW
9
POC
0
KEV

Monthly

CVE-2026-29129 HIGH PATCH GHSA This Week

Cipher preference order enforcement failure in Apache Tomcat 9.0.114-9.0.115, 10.1.51-10.1.52, and 11.0.16-11.0.18 allows unauthenticated remote attackers to force selection of weaker cryptographic ciphers during TLS negotiation, enabling potential decryption of confidential data transmitted over HTTPS connections. The vulnerability stems from improper preservation of administrator-configured cipher suite priority, potentially exposing sensitive session data, credentials, or application content. No public exploit identified at time of analysis. CVSS 7.5 (High) reflects network-accessible confidentiality impact requiring no privileges.

Apache Information Disclosure Tomcat Apache Tomcat
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-14859 HIGH This Week

Cryptographic bypass in Semtech LR11xx LoRa transceiver secure boot allows physically proximate attackers to install arbitrary firmware via hash collision. The implementation uses a non-standard, collision-vulnerable hashing algorithm (CWE-327), enabling second preimage attacks that forge signed firmware images. Affects LR1110, LR1120, and LR1121 transceivers widely deployed in IoT/LoRaWAN devices. CVSS 7.0 requires physical access (AV:P), low complexity, no privileges. No public exploit identified at time of analysis; EPSS data unavailable for this recent CVE.

Authentication Bypass
NVD
CVSS 4.0
7.0
EPSS
0.0%
CVE-2026-34950 CRITICAL PATCH GHSA Act Now

JWT algorithm confusion in fast-jwt npm package allows remote attackers to forge authentication tokens with arbitrary claims by exploiting incomplete CVE-2023-48223 remediation. The vulnerability (CVSS 9.1 Critical) affects applications using RS256 with public keys containing leading whitespace—a common scenario in database-stored keys, YAML configurations, and environment variables. Attackers possessing the RSA public key (inherently public information) can craft HS256 tokens accepted as valid by the verifier, enabling privilege escalation (e.g., admin: false → admin: true). No authentication required (PR:N), network-exploitable (AV:N), low complexity (AC:L). No public exploit identified at time of analysis, though detailed proof-of-concept code exists in the advisory.

RCE Python PostgreSQL
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-13916 MEDIUM PATCH This Month

IBM Aspera Shares versions 1.9.9 through 1.11.0 implements insufficient cryptographic strength that permits remote attackers without authentication to decrypt sensitive information. The vulnerability stems from use of weaker-than-expected cryptographic algorithms, allowing confidentiality breach of data protected by the application. A vendor patch is available.

Information Disclosure IBM
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-25834 MEDIUM PATCH This Month

Mbed TLS versions 3.3.0 through 3.6.5 and 4.0.0 are vulnerable to algorithm downgrade attacks via signature algorithm injection, allowing attackers to force the use of weaker cryptographic algorithms during TLS handshakes. This information disclosure vulnerability affects all applications using the affected Mbed TLS library versions and could enable attackers to compromise the confidentiality of encrypted communications by downgrading to algorithms with known weaknesses.

Information Disclosure Redhat Suse
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-33322 CRITICAL Act Now

JWT algorithm confusion in MinIO's OpenID Connect authentication enables attackers with knowledge of the OIDC ClientSecret to forge identity tokens and obtain S3 credentials with unrestricted IAM policies, including administrative access. Affected users can have their identities impersonated and their data accessed, modified, or deleted with 100% attack success rate. The vulnerability impacts MinIO deployments across Docker, Apple, and Microsoft platforms, with no patch currently available.

Information Disclosure Docker Apple Microsoft
NVD GitHub VulDB
CVSS 4.0
9.2
EPSS
0.0%
CVE-2026-20996 HIGH This Week

A cryptographic downgrade vulnerability in Samsung Smart Switch allows remote attackers to force the application to use weak authentication schemes during device-to-device transfers. The vulnerability affects Smart Switch versions prior to 3.7.69.15 and requires user interaction to exploit, potentially exposing sensitive data during the transfer process between Samsung devices. With a CVSS 4.0 score of 7.1 and no current evidence of active exploitation or public proof-of-concept code, this represents a moderate risk primarily to Samsung device users performing data migrations.

Information Disclosure
NVD VulDB
CVSS 4.0
7.1
EPSS
0.2%
CVE-2026-28252 CRITICAL Act Now

Trane Tracer SC, SC+, and Concierge building automation controllers use broken cryptographic algorithms that allow attackers to bypass authentication and gain root access. These are critical building management systems controlling HVAC in commercial facilities.

Authentication Bypass
NVD VulDB
CVSS 4.0
9.2
EPSS
0.1%
CVE-2025-41711 MEDIUM This Month

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-28479 HIGH PATCH This Week

OpenClaw versions up to 2026.2.15 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Docker Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-29129
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Cipher preference order enforcement failure in Apache Tomcat 9.0.114-9.0.115, 10.1.51-10.1.52, and 11.0.16-11.0.18 allows unauthenticated remote attackers to force selection of weaker cryptographic ciphers during TLS negotiation, enabling potential decryption of confidential data transmitted over HTTPS connections. The vulnerability stems from improper preservation of administrator-configured cipher suite priority, potentially exposing sensitive session data, credentials, or application content. No public exploit identified at time of analysis. CVSS 7.5 (High) reflects network-accessible confidentiality impact requiring no privileges.

Apache Information Disclosure Tomcat +1
NVD VulDB
CVE-2025-14859
EPSS 0% CVSS 7.0
HIGH This Week

Cryptographic bypass in Semtech LR11xx LoRa transceiver secure boot allows physically proximate attackers to install arbitrary firmware via hash collision. The implementation uses a non-standard, collision-vulnerable hashing algorithm (CWE-327), enabling second preimage attacks that forge signed firmware images. Affects LR1110, LR1120, and LR1121 transceivers widely deployed in IoT/LoRaWAN devices. CVSS 7.0 requires physical access (AV:P), low complexity, no privileges. No public exploit identified at time of analysis; EPSS data unavailable for this recent CVE.

Authentication Bypass
NVD
CVE-2026-34950
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

JWT algorithm confusion in fast-jwt npm package allows remote attackers to forge authentication tokens with arbitrary claims by exploiting incomplete CVE-2023-48223 remediation. The vulnerability (CVSS 9.1 Critical) affects applications using RS256 with public keys containing leading whitespace—a common scenario in database-stored keys, YAML configurations, and environment variables. Attackers possessing the RSA public key (inherently public information) can craft HS256 tokens accepted as valid by the verifier, enabling privilege escalation (e.g., admin: false → admin: true). No authentication required (PR:N), network-exploitable (AV:N), low complexity (AC:L). No public exploit identified at time of analysis, though detailed proof-of-concept code exists in the advisory.

RCE Python PostgreSQL
NVD GitHub
CVE-2025-13916
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

IBM Aspera Shares versions 1.9.9 through 1.11.0 implements insufficient cryptographic strength that permits remote attackers without authentication to decrypt sensitive information. The vulnerability stems from use of weaker-than-expected cryptographic algorithms, allowing confidentiality breach of data protected by the application. A vendor patch is available.

Information Disclosure IBM
NVD
CVE-2026-25834
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Mbed TLS versions 3.3.0 through 3.6.5 and 4.0.0 are vulnerable to algorithm downgrade attacks via signature algorithm injection, allowing attackers to force the use of weaker cryptographic algorithms during TLS handshakes. This information disclosure vulnerability affects all applications using the affected Mbed TLS library versions and could enable attackers to compromise the confidentiality of encrypted communications by downgrading to algorithms with known weaknesses.

Information Disclosure Redhat Suse
NVD VulDB
CVE-2026-33322
EPSS 0% CVSS 9.2
CRITICAL Act Now

JWT algorithm confusion in MinIO's OpenID Connect authentication enables attackers with knowledge of the OIDC ClientSecret to forge identity tokens and obtain S3 credentials with unrestricted IAM policies, including administrative access. Affected users can have their identities impersonated and their data accessed, modified, or deleted with 100% attack success rate. The vulnerability impacts MinIO deployments across Docker, Apple, and Microsoft platforms, with no patch currently available.

Information Disclosure Docker Apple +1
NVD GitHub VulDB
CVE-2026-20996
EPSS 0% CVSS 7.1
HIGH This Week

A cryptographic downgrade vulnerability in Samsung Smart Switch allows remote attackers to force the application to use weak authentication schemes during device-to-device transfers. The vulnerability affects Smart Switch versions prior to 3.7.69.15 and requires user interaction to exploit, potentially exposing sensitive data during the transfer process between Samsung devices. With a CVSS 4.0 score of 7.1 and no current evidence of active exploitation or public proof-of-concept code, this represents a moderate risk primarily to Samsung device users performing data migrations.

Information Disclosure
NVD VulDB
CVE-2026-28252
EPSS 0% CVSS 9.2
CRITICAL Act Now

Trane Tracer SC, SC+, and Concierge building automation controllers use broken cryptographic algorithms that allow attackers to bypass authentication and gain root access. These are critical building management systems controlling HVAC in commercial facilities.

Authentication Bypass
NVD VulDB
CVE-2025-41711
EPSS 0% CVSS 5.3
MEDIUM This Month

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVE-2026-28479
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw versions up to 2026.2.15 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Docker Information Disclosure Openclaw
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy