Encryption Brute Forcing 
CWE326

Inadequate Encryption Strength

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE693

Protection Mechanism Failure

CWE1204

Generation of Weak Initialization Vector (IV)


Creating a Rogue Certification Authority Certificate 
CWE290

Authentication Bypass by Spoofing

CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm


Signature Spoof 
CWE20

Improper Input Validation

CWE290

Authentication Bypass by Spoofing

CWE327

Use of a Broken or Risky Cryptographic Algorithm


Signature Spoofing by Improper Validation 
CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE347

Improper Verification of Cryptographic Signature


Cryptanalysis of Cellular Encryption 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Rooting SIM Cards 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Cryptanalysis 
CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE1204

Generation of Weak Initialization Vector (IV)

CWE1240

Use of a Risky Cryptographic Primitive

CWE1241

Use of Predictable Algorithm in Random Number Generator

CWE1279

Cryptographic Operations are run Before Supporting Units are Ready

