A security administrator identifies an application that is storing data using MD5. Which of the following best identifies the vulnerability likely present in the application?
Correct Answer: A
The vulnerability likely present in the application that is storing data using MD5 is a cryptographic vulnerability. MD5 is considered to be a weak hashing algorithm due to its susceptibility to collision attacks, where two different inputs produce the same hash output, compromising data integrity and security.
* Cryptographic: Refers to vulnerabilities in cryptographic algorithms or implementations, such as the weaknesses in MD5.
* Malicious update: Refers to the intentional injection of harmful updates, not related to the use of MD5.
* Zero day: Refers to previously unknown vulnerabilities for which no patch is available, not specifically related to MD5.
* Side loading: Involves installing software from unofficial sources, not directly related to the use of MD5.