-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hash Generated Using Broken Cryptography API (SHA1) #685
Comments
Can someone please help on this!!? |
Thanks for reporting and sorry for the delay, these have been a couple of busy weeks. |
@cipolleschi please can this issue be taken on priority to fix? |
@cipolleschi @nlutsenko @facebookincubator |
I too am facing this in one of my application. Does anyone has any solution for this? Please help. |
Is anyone looking into this?? |
Hash Generated Using Broken Cryptography API (SHA1)
Severity: Medium
Exploitability: Difficult
CVSS: 4.0
The following code locations within the App use 'CC_SHA1' or 'CryptoKit.Insecure.SHA1' functions to generate a message digest:
unsymbolicated_function calls_CC_SHA1()
The vulnerable code locations use the 'CC_SHA1' or 'CryptoKit.Insecure.SHA1' hashing functions, which leverage hashing algorithms that are proven to be vulnerable to collision attacks, and are unsuitable for modern use.
Apple officially considers this algorithm insecure. They state in iOS 13 CryptoKit documentation:
Recommendation:
Switch each usage of these outdated hashing functions to use a stronger algorithm with better collision resistance properties, such as SHA-256 or SHA-512.
ScreenShot: N/A
Stack Trace:
The following related source code symbols were identified:
Analysis:
Impacted Files:
Note: There can be other such impacted files as well. As of now, I could able to locate above three based on provided stack trace details.
The text was updated successfully, but these errors were encountered: