LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CWE WEAKNESSES  /  CWE-326

CWE-326

Inadequate Encryption Strength

Class

What it is

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

A weak encryption scheme can be subjected to brute force attacks that have a reasonable chance of succeeding using current attack methods and resources.

Impact

Access Control, ConfidentialityBypass Protection Mechanism, Read Application Data

Mitigations

  • [Architecture and Design] Use an encryption scheme that is currently considered to be strong by experts in the field.

Real-world CVE examples

Related weaknesses

Test & detect

Browse all common weaknesses, check related exploited CVEs, or map to ATT&CK techniques.

Source: MITRE CWE. View on cwe.mitre.org →

Scroll to Top