SFP Secondary Cluster: Weak Cryptography
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
This category identifies Software Fault Patterns (SFPs) within the Weak Cryptography cluster.
The software does not verify, or incorrectly verifies, the cryptographic signature for data.
The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
The software performs a key exchange with an actor without verifying the identity of that actor.
Not using a random initialization Vector (IV) with Cipher Block Chaining (CBC) Mode causes algorithms to be susceptible to dictionary attacks.
Nonces should be used for the present occasion and only once.
The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attac...
Obscuring a password with a trivial encoding does not protect the password.
The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).