CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Description
The weakness is very dangerous and consists in using of broken or risky cryptographic algorithm for compromising confidentiality and integrity of potentially sensitive information. By applying of cryptographic algorithm attackers can also put the data source at risk.
The vulnerability is intoduced during Architecture and Design stage.