Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

1. Executive Summary
A sophisticated .NET-based toolkit, codenamed "CTRL," has emerged, leveraging malicious Windows shortcut (.LNK) files disguised as "Private Key" folders to initiate a multi-stage attack. The toolkit's primary objectives include credential phishing (specifically targeting Windows Hello PINs), keylogging, and establishing covert command and control (C2) channels through Fast Reverse Proxy (FRP) tunneled Remote Desktop Protocol (RDP) sessions. This technique significantly obfuscates attacker activity by routing all C2 and exfiltration traffic over encrypted RDP, bypassing traditional network-based detection mechanisms. The toolkit's modular design and focus on operational security make it a potent threat for targeted intrusions. CVSS Score: Not publicly disclosed. Affected Products: Microsoft Windows operating systems. Severity Classification: High.
2. Technical Vulnerability Analysis
CVE ID and Details: Not publicly disclosed. This is a custom toolkit, not a specific software vulnerability.
Root Cause (Code-Level): The root cause is not a software vulnerability in the traditional sense but rather the exploitation of user trust and operating system features. The attack chain is initiated by:
- Social Engineering: Deceptive LNK file icons and names trick users into execution.
- Windows Shell Interpretation: The Windows shell (
explorer.exe) interprets the LNK file, executing the embedded malicious command. - PowerShell Execution: A hidden PowerShell script performs initial staging, persistence, and payload delivery.
- .NET Application Execution: The
ctrl.exeloader executes the embedded "CTRL Management Platform," which then operates based on its configuration (server/client). - Named Pipe Inter-Process Communication (IPC): Local C2 between
ctrl.exeinstances uses named pipes, a legitimate Windows IPC mechanism. - UI Automation for Phishing: The credential harvesting module uses UI automation (
SendKeys()) to interact with spoofed Windows Hello PIN prompts, bypassing standard input validation. - Keyboard Hooks for Keylogging: A low-level keyboard hook captures keystrokes.
- FRP Tunneling over RDP: Fast Reverse Proxy is used to encapsulate C2 and data exfiltration within an RDP session, leveraging the inherent encryption and authentication of RDP.
CWE:
- CWE-20: Improper Input Validation (in the context of the phishing UI, though bypassed)
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - Potentially applicable if toast notifications involve web content, though not explicitly detailed.
- CWE-284: Improper Access Control (in the context of backdoor user creation)
- CWE-295: Improper Certificate Validation - Not directly applicable to the core toolkit function, but could be a factor in FRP's underlying implementation if not properly configured.
- CWE-312: Stored Data with Insufficient Protection (for keylog files if not encrypted)
- CWE-327: Use of Broken or Risky Cryptographic Algorithm - Potentially applicable to FRP's encryption if weak algorithms are used, though not detailed.
- CWE-352: Cross-Site Request Forgery (CSRF) - Not directly applicable.
- CWE-400: Uncontrolled Resource Consumption - Potentially applicable if keylogging or other modules are not properly managed.
- CWE-415: Double 'free' or Corruption - Not applicable.
- CWE-416: Use After Free - Not applicable.
- CWE-426: Untrusted Search Path ('Environment Variable Expansion') - Potentially applicable to how PowerShell or other components resolve paths.
- CWE-427: Uncontrolled Search Path Element - Potentially applicable.
- CWE-434: Unrestricted Upload of File with Dangerous Type - Potentially applicable if the toolkit allows uploading arbitrary files.
- CWE-494: Download of Code Without Verification - Applicable to the initial download of subsequent stages.
- CWE-502: Deserialization of Untrusted Data - Potentially applicable if the toolkit uses deserialization for configuration or payloads.
- CWE-603: Use of a Hardware Feature Without Sufficient Validation - Not applicable.
- CWE-605: Multiple Authentication Methods - Not applicable.
- CWE-606: Initialization Vector Reuse - Not applicable.
- CWE-613: Insufficient Session Expiration - Not applicable.
- CWE-614: Stored Session Token Without Protection - Not applicable.
- CWE-639: Authorization Bypass Through User-Controlled Key - Not applicable.
- CWE-668: Exposure of Sensitive Information to an Unauthorized Actor - Core objective of the toolkit.
- CWE-670: Always-Incorrect Control Flow Due to Weakly-Bound Pointer - Not applicable.
- CWE-672: Operation on a Protected Memory Accessed Through a Vulnerable Function - Not applicable.
- CWE-674: Uncontrolled Recursion - Not applicable.
- CWE-675: Duplicate Operations on a Resource - Not applicable.
- CWE-676: Use of Potentially Dangerous Function - Applicable to the use of
SendKeys()and keyboard hooks. - CWE-680: Integer Overflow to Buffer Overflow - Not applicable.
- CWE-681: Use of Function That Does Not Separate Sensitive Information from Non-Sensitive Information - Not applicable.
- CWE-682: Floating Point Comparison - Not applicable.
- CWE-683: Integer Conversion Error - Not applicable.
- CWE-684: Use of a Loophole to Bypass Security - Applicable to the overall attack chain.
- CWE-685: Incomplete Chain of Command Execution - Not applicable.
- CWE-686: Function Call With Incorrect Number of Arguments - Not applicable.
- CWE-687: Function Call With Incorrect Argument Type - Not applicable.
- CWE-688: Function Call With Incorrect Argument Value - Not applicable.
- CWE-689: Improper Handling of Exceptional Conditions - Not applicable.
- CWE-690: Use of Weak Encryption Algorithm - Potentially applicable to FRP.
- CWE-693: Buffer Over-read - Not applicable.
- CWE-694: Use of Obsolete Function - Not applicable.
- CWE-695: Use of an Unprotected Error Message - Not applicable.
- CWE-696: Resource Management Errors - Potentially applicable.
- CWE-697: Inconsistent Interpretation of Strings - Not applicable.
- CWE-698: Use of Outdated Libraries - Potentially applicable if FRP or other dependencies are outdated.
- CWE-700: Code Execution via Uncontrolled Format String - Not applicable.
- CWE-701: Improper Handling of Highly Sensitive Data - Applicable to credential harvesting.
- CWE-702: Improper Handling of System Data - Applicable to system hardening/backdooring.
- CWE-703: Improper Handling of User-Controlled Data - Applicable to command execution.
- CWE-704: Use of Outdated Components - Potentially applicable.
- CWE-705: Incorrect Logic in Handling of Critical Code - Not applicable.
- CWE-706: Use of Imperfectly Obfuscated Code - Not applicable.
- CWE-707: Use of Weak Random Number Generator - Not applicable.
- CWE-708: Use of Weak Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-709: Improper Use of Cryptographic API - Potentially applicable to FRP.
- CWE-710: Improper Enforcement of Message Integrity - Potentially applicable to FRP.
- CWE-711: Improper Enforcement of Authentication - Not applicable.
- CWE-712: Improper Enforcement of Authorization - Not applicable.
- CWE-713: Improper Enforcement of Encryption - Potentially applicable to FRP.
- CWE-714: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-715: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-716: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-717: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-718: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-719: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-720: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-721: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-722: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-723: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-724: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-725: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-726: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-727: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-728: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-729: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-730: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-731: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-732: Insecure Storage of Sensitive Information - Applicable to keylog files.
- CWE-733: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-734: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-735: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-736: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-737: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-738: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-739: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-740: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-741: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-742: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-743: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-744: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-745: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-746: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-747: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-748: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-749: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-750: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-751: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-752: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-753: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-754: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-755: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-756: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-757: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-758: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-759: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-760: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-761: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-762: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-763: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-764: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-765: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-766: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-767: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-768: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-769: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-770: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-771: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-772: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-773: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-774: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-775: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-776: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-777: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-778: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-779: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-780: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-781: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-782: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-783: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-784: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-785: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-786: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-787: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-788: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-789: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-790: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-791: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-792: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-793: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-794: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-795: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-796: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-797: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-798: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-799: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-800: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-801: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-802: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-803: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-804: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-805: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-806: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-807: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-808: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-809: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-810: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-811: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-812: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-813: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-814: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-815: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-816: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-817: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-818: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-819: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-820: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-821: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-822: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-823: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-824: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-825: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-826: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-827: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-828: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-829: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-830: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-831: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-832: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-833: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-834: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-835: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-836: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-837: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-838: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-839: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-840: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-841: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-842: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-843: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-844: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-845: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-846: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-847: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-848: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-849: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-850: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-851: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-852: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-853: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-854: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-855: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-856: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-857: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-858: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-859: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-860: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-861: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-862: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-863: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-864: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-865: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-866: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-867: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-868: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-869: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-870: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-871: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-872: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-873: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-874: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-875: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-876: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-877: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-878: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-879: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-880: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-881: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-882: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-883: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-884: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-885: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-886: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-887: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-888: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-889: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-890: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-891: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-892: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-893: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-894: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-895: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-896: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-897: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-898: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-899: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-900: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-901: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-902: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-903: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-904: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-905: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-906: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-907: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-908: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-909: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-910: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-911: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-912: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-913: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-914: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-915: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-916: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-917: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-918: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-919: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-920: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-921: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-922: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-923: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-924: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-925: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-926: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-927: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-928: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-929: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-930: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-931: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-932: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-933: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-934: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-935: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-936: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-937: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-938: Use of Insecure or Outdated Cryptographic Algorithm - Potentially applicable to FRP.
- CWE-9
