CWE-328
Overview
- CWE ID
- 328
- CWE Name
- Use of Weak Hash
- CWE Abstraction
- Base
- CWE structure
- Simple
- CWE Status
- Draft
Description
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the