Rooting SIM Cards 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Encryption Brute Forcing 
CWE326

Inadequate Encryption Strength

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE693

Protection Mechanism Failure

CWE719

OWASP Top Ten 2007 Category A8  Insecure Cryptographic Storage


Cryptanalysis of Cellular Encryption 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Signature Spoofing by Improper Validation 
CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE347

Improper Verification of Cryptographic Signature


Cryptanalysis 
CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE1240

Use of a Risky Cryptographic Primitive

CWE1241

Use of Predictable Algorithm in Random Number Generator

CWE1279

Cryptographic Operations are run Before Supporting Units are Ready


Creating a Rogue Certification Authority Certificate 
CWE290

Authentication Bypass by Spoofing

CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm


Signature Spoof 
CWE20

Improper Input Validation

CWE290

Authentication Bypass by Spoofing

CWE327

Use of a Broken or Risky Cryptographic Algorithm

