Use of a broken or risky cryptographic algorithm in Smart...
High severity
Unreviewed
Published
Oct 10, 2025
to the GitHub Advisory Database
•
Updated Oct 10, 2025
Description
Published by the National Vulnerability Database
Oct 10, 2025
Published to the GitHub Advisory Database
Oct 10, 2025
Last updated
Oct 10, 2025
Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.
References