CAPEC | Related Weakness |
Signature Spoof |
CWE-20 | Improper Input Validation |
CWE-290 | Authentication Bypass by Spoofing |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|
Rooting SIM Cards |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|
Cryptanalysis |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|
Creating a Rogue Certification Authority Certificate |
CWE-290 | Authentication Bypass by Spoofing |
CWE-295 | Improper Certificate Validation |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|
Signature Spoofing by Improper Validation |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|
Encryption Brute Forcing |
CWE-326 | Inadequate Encryption Strength |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
CWE-693 | Protection Mechanism Failure |
CWE-719 | OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
|
Cryptanalysis of Cellular Encryption |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
|