Modes Of Introduction
Architecture and Design
Implementation
Piattaforme applicabili
Linguaggio
Class: Not Language-Specific (Undetermined)
Conseguenze comuni
| Ambito |
Impatto |
Probabilità |
| Access Control | Bypass Protection Mechanism | |
Esempi osservati
| Riferimenti |
Descrizione |
| Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. |
| Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. |
| Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. |
| Logic error prevents some required conditions from being enforced during Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5). |
| Shared secret not verified in a RADIUS response packet, allowing authentication bypass by spoofing server replies. |
| Insufficient verification in VoIP implementation, in violation of standard, allows spoofed messages. |
| Insufficient verification in VoIP implementation, in violation of standard, allows spoofed messages. |
| Security check not applied to all components, allowing bypass. |
Note sulla mappatura delle vulnerabilità
Giustificazione : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commento : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Note
This is a "missing step" error on the product side, which can overlap weaknesses such as insufficient verification and spoofing. It is frequently found in cryptographic and authentication errors. It is sometimes resultant.
Invio
| Nome |
Organizzazione |
Data |
Data di rilascio |
Version |
| PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifiche
| Nome |
Organizzazione |
Data |
Commento |
| Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Time_of_Introduction |
| CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Relationships, Other_Notes, Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2009-05-27 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2009-10-29 +00:00 |
updated Modes_of_Introduction, Observed_Examples, Other_Notes, Relationship_Notes |
| CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences, Relationships, Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Relationships, Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2015-12-07 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Applicable_Platforms |
| CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Weakness_Ordinalities |