diff --git a/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_exponent_selection/template.md b/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_exponent_selection/template.md index 6c474bb4..681173b6 100644 --- a/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_exponent_selection/template.md +++ b/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_exponent_selection/template.md @@ -2,7 +2,7 @@ ## Overview of the Vulnerability -Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure cryptographic keys that have improper asymmetric exponent selection. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. +Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure key generation mechanism that involves improper asymmetric exponent selection. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. ## Business Impact diff --git a/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_prime_selection/template.md b/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_prime_selection/template.md index 086d0247..b7ebe013 100644 --- a/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_prime_selection/template.md +++ b/submissions/description/cryptographic_weakness/insecure_key_generation/improper_asymmetric_prime_selection/template.md @@ -2,7 +2,7 @@ ## Overview of the Vulnerability -Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure cryptographic keys that have improper asymmetric prime selection. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. +Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure key generation mechanism that involves improper asymmetric prime selection. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. ## Business Impact diff --git a/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_space/template.md b/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_space/template.md index 9d52e1ee..02895f2b 100644 --- a/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_space/template.md +++ b/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_space/template.md @@ -2,7 +2,7 @@ ## Overview of the Vulnerability -Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains insecure cryptographic keys that have insufficient key space. This can allow an attacker to use brute-force techniques to identify keys and break the confidentiality of requests sent to and from the endpoint. +Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure key generation mechanism that has insufficient key space. This can allow an attacker to use brute-force techniques to identify keys and break the confidentiality of requests sent to and from the endpoint. ## Business Impact diff --git a/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_stretching/template.md b/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_stretching/template.md index 1b6c62a5..073f5424 100644 --- a/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_stretching/template.md +++ b/submissions/description/cryptographic_weakness/insecure_key_generation/insufficient_key_stretching/template.md @@ -2,7 +2,7 @@ ## Overview of the Vulnerability -Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains insecure cryptographic keys that have insufficient key stretching. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. +Cryptography is used to ensure secure storage and transmission of data. However, there are a number of best practices that must be followed to ensure the cryptography in use remains secure and does not result in the exposure of sensitive data. It was identified that the endpoint contains an insecure key generation mechanism that has insufficient key stretching. This can allow an attacker to identify keys and break the confidentiality of requests sent to and from the endpoint. ## Business Impact