SiteShadow
Back to vulnerability library

CWE-757 Selection of Less-Secure Algorithm

What this means

SiteShadow flagged a pattern where the system can be coerced into using weaker/legacy cryptography than intended (older TLS versions, weak cipher suites, permissive "compatibility" fallbacks, or algorithm negotiation without a strict minimum).

Why it matters

Attackers can force weaker algorithms or protocols.

Safer examples

1) Set strict minimum TLS versions (Node.js)

import https from "https";

export const agent = new https.Agent({
  minVersion: "TLSv1.2", // or TLSv1.3 when possible
});

2) Avoid "allow insecure fallback" switches

Remove options like "accept legacy", "allow insecure renegotiation", or "disable certificate checks" (see CWE-295 / T01).

3) Prefer modern algorithms and modes by default

For encryption, use AEAD modes (e.g., AES-GCM, ChaCha20-Poly1305) and avoid deprecated algorithms/modes.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage