Skip to main content

Use of a Broken or Risky Cryptographic Algorithm

CVE-2020-29536

Severity Medium
Score 4/10

Summary

Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. A remote authenticated malicious attacker with access to service files may obtain sensitive information to use it in further attacks.

  • LOW
  • NETWORK
  • SINGLE
  • NONE
  • PARTIAL
  • NONE

CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

References

Advisory Timeline

  • Published