Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
The product uses a broken or risky cryptographic algorithm or protocol.