Use of a Broken or Risky Cryptographic Algorithm
IBM Sterling B2B Integrator Standard Edition 184.108.40.206, 220.127.116.11_6, 18.104.22.168, and 22.214.171.124 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 147294.
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.