The use of a broken or risky cryptographic algorithm is...
Moderate severity
Unreviewed
Published
Dec 28, 2021
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Dec 27, 2021
Published to the GitHub Advisory Database
Dec 28, 2021
Last updated
Feb 3, 2023
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0.
References