SFP Secondary Cluster: Weak Cryptography
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Summary
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
This category identifies Software Fault Patterns (SFPs) within the Weak Cryptography cluster.
Weaknesses
The product generates and uses a predictable initialization Vector (IV) with Cipher Block Chaining (CBC) Mode, which causes algorithms to be susceptible to dictionary ...
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
The product performs a key exchange with an actor without verifying the identity of that actor.
Nonces should be used for the present occasion and only once.
The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attac...
Obscuring a password with a trivial encoding does not protect the password.
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Concepts
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).
Common Weakness Enumeration content on this website is copyright of The MITRE Corporation unless otherwise specified. Use of the Common Weakness Enumeration and the associated references on this website are subject to the Terms of Use as specified by The MITRE Corporation.