5. of Information Disclosure
An attacker may be able to read a document or data because it’s encrypted with a non-standard algorithm.
Threat |
|
You’re using an encryption you wrote yourself to protect your data instead of a known strong encryption algorithm that has been industry-tested. |
|
CAPEC |
CAPEC-192 - Protocol Analysis CAPEC-97 - Cryptanalysis |
ASVS |
6.2.2 - Ensure standard recognized and tested cryptographic algorithms are being used. |
CWE |
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm |
Mitigations |
|
|