SiteShadow
Back to vulnerability library

CWE-327 Broken or Risky Cryptographic Algorithm

What this means

SiteShadow flagged use of cryptographic algorithms or settings that are considered broken, weak, or deprecated for security purposes.

Why it matters

Broken crypto can be brute-forced or bypassed.

Safer examples

1) Use modern, vetted primitives

2) Avoid deprecated/broken algorithms for security

Examples: MD5, SHA1 (for integrity/auth), DES/3DES, RC4.

3) Prefer libraries that are secure-by-default

Minimize custom crypto configuration and avoid rolling your own.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage