结构: Simple
Abstraction: Class
状态: Draft
被利用可能性: unkown
The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
A weak encryption scheme can be subjected to brute force attacks that have a reasonable chance of succeeding using current attack methods and resources.
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Access Control', 'Confidentiality'] | ['Bypass Protection Mechanism', 'Read Application Data'] | An attacker may be able to decrypt the data using brute force attacks. |
策略:
Use a cryptographic algorithm that is currently considered to be strong by experts in the field.
标识 | 说明 | 链接 |
---|---|---|
CVE-2001-1546 | Weak encryption | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1546 |
CVE-2004-2172 | Weak encryption (chosen plaintext attack) | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2172 |
CVE-2002-1682 | Weak encryption | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1682 |
CVE-2002-1697 | Weak encryption produces same ciphertext from the same plaintext blocks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1697 |
CVE-2002-1739 | Weak encryption | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1739 |
CVE-2005-2281 | Weak encryption scheme | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2281 |
CVE-2002-1872 | Weak encryption (XOR) | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1872 |
CVE-2002-1910 | Weak encryption (reversible algorithm). | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1910 |
CVE-2002-1946 | Weak encryption (one-to-one mapping). | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1946 |
CVE-2002-1975 | Encryption error uses fixed salt, simplifying brute force / dictionary attacks (overlaps randomness). | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1975 |
Maintenance A variety of encryption algorithms exist, with various weaknesses. This category could probably be split into smaller sub-categories. Maintenance Relationships between CWE-310, CWE-326, and CWE-327 and all their children need to be reviewed and reorganized.
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Weak Encryption | ||
OWASP Top Ten 2007 | A8 | CWE More Specific | Insecure Cryptographic Storage |
OWASP Top Ten 2007 | A9 | CWE More Specific | Insecure Communications |
OWASP Top Ten 2004 | A8 | CWE More Specific | Insecure Storage |