Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: REM Cost Reform

...

This noncompliant code example shows an example where ...

Code Block
bgColor#FFCCCC
 


Compliant Solution

In this compliant solution, ...

 
Code Block
bgColor#CCCCFF

Risk Assessment

Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.

Rule

Severity

Likelihood

Detectable

RepairableRemediation Cost

Priority

Level

MSC25-C

Medium

Probable

No

NoHigh

P4

L3

Automated Detection

ToolVersionCheckerDescription
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V

BADMACRO.WEAK_CRYPTO
BADFUNC.WEAKCRYPTO

Use of Weak Cryptographic Algorithm
Weak Cryptography

Related Guidelines

Bibliography