You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When running vulnerability report in datadog the results show the following:
The application uses a hashing algorithm that does not meet today's generally accepted standards. Cryptography is difficult and there are many minor mistakes which can lead to a cryptosystem leaking information, or worse. Choosing a hashing algorithm that is known to be unsafe is a very common way to completely undermine security. Frequently, the use of a weak algorithm will allow credentials or data to be extracted.
It refers to SHA1 Hash function used in BuildCounterKey method:
using var algorithm = SHA1.Create();
var hash = algorithm.ComputeHash(bytes);
The suggested remediation to use SHA256 instead
The text was updated successfully, but these errors were encountered:
When running vulnerability report in datadog the results show the following:
The application uses a hashing algorithm that does not meet today's generally accepted standards. Cryptography is difficult and there are many minor mistakes which can lead to a cryptosystem leaking information, or worse. Choosing a hashing algorithm that is known to be unsafe is a very common way to completely undermine security. Frequently, the use of a weak algorithm will allow credentials or data to be extracted.
It refers to SHA1 Hash function used in BuildCounterKey method:
using var algorithm = SHA1.Create();
var hash = algorithm.ComputeHash(bytes);
The suggested remediation to use SHA256 instead
The text was updated successfully, but these errors were encountered: