Loading
The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.
Cite this page
CVE-2016-2379. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2016-2379
Use CWE-326, Pidgin vendor hub and Mxit product page to widen CVE-2016-2379 into its surrounding weakness, vendor, and product context.