Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This noncompliant code example shows an example where ...

Code Block
bgColor#FFCCCC
 


Compliant Solution

In this compliant solution, ...

Code Block
bgColor#CCCCFF
 

Risk Assessment

Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSC25-C

Medium

Probable

High

P4

L3

...

ToolVersionCheckerDescription
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V

BADMACRO.WEAK_CRYPTO
BADFUNC.WEAKCRYPTO

Use of Weak Cryptographic Algorithm
Weak Cryptography

Related Guidelines

Bibliography