Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Generation of Weak Initialization Vector (IV)

The product uses a cryptographic primitive that uses an Initializationn Vector (IV), but the product does not generate IVs that aren sufficiently unpredictable or unique according to the expectedn cryptographic requirements for that primitive.n