Signature Spoof 
CWE20

Improper Input Validation

CWE290

Authentication Bypass by Spoofing

CWE327

Use of a Broken or Risky Cryptographic Algorithm


Creating a Rogue Certification Authority Certificate 
CWE290

Authentication Bypass by Spoofing

CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm


Encryption Brute Forcing 
CWE326

Inadequate Encryption Strength

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE693

Protection Mechanism Failure

CWE719

OWASP Top Ten 2007 Category A8  Insecure Cryptographic Storage


Signature Spoofing by Improper Validation 
CWE295

Improper Certificate Validation

CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE347

Improper Verification of Cryptographic Signature


Cryptanalysis of Cellular Encryption 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Rooting SIM Cards 
CWE327

Use of a Broken or Risky Cryptographic Algorithm


Cryptanalysis 
CWE327

Use of a Broken or Risky Cryptographic Algorithm

CWE1240

Use of a Risky Cryptographic Primitive

CWE1241

Use of Predictable Algorithm in Random Number Generator

CWE1279

Cryptographic Operations are run Before Supporting Units are Ready

