CINXE.COM
CWE - CWE-798: Use of Hard-coded Credentials (4.16)
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><!--?xml version="1.0" encoding="iso-8859-1"?--> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" encoding="iso-8859-1"> <head> <base href="https://cwe.mitre.org/data/definitions/798.html"> <meta http-equiv="content-type" content="text/html; charset=utf-8"> <meta name="description" content="Common Weakness Enumeration (CWE) is a list of software weaknesses."> <meta http-equiv="X-UA-Compatible" content="IE=Edge"> <link rel="shortcut icon" href="/favicon.ico"> <link href="/css/main.css?version=4.0.022420" rel="stylesheet" type="text/css"> <link href="/css/custom.css" rel="stylesheet" type="text/css"><!--[if IE]> <link rel="stylesheet" type="text/css" href="/css/ie.css?version=1.7" /> <![endif]--> <script src="/includes/custom_filter.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/browserheight.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/jquery.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/cwe_minimizer.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/cookie.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/includeglossarydef.js" language="JavaScript" type="text/javascript"></script> <link href="/css/print.css?version=1.11" rel="stylesheet" media="print" type="text/css"> <link href="/css/user_skins/complete.css" rel="stylesheet" type="text/css"> <noscript> <style type="text/css"> #script { visibility:collapse; visibility:hidden; font-size:0px; height:0px; width:0px } #noscript { visibility:visible; font-size:inherit; height:inherit; width:inherit} </style> </noscript> <title>CWE - CWE-798: Use of Hard-coded Credentials (4.16) </title> <meta http-equiv="X-Translated-By" content="Google"> <meta http-equiv="X-Translated-To" content="lv"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.omlEigW4xY8.O/am=DgY/d=1/rs=AN8SPfpjsL9kUWY0h-sp7Ilu7hZWGwEmeg/m=corsproxy" data-sourceurl="https://cwe.mitre.org/data/definitions/798.html"></script> <link href="https://fonts.googleapis.com/css2?family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20..48,100..700,0..1,-50..200" rel="stylesheet"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.omlEigW4xY8.O/am=DgY/d=1/exm=corsproxy/ed=1/rs=AN8SPfpjsL9kUWY0h-sp7Ilu7hZWGwEmeg/m=phishing_protection" data-phishing-protection-enabled="false" data-forms-warning-enabled="true" data-source-url="https://cwe.mitre.org/data/definitions/798.html"></script> <meta name="robots" content="none"> </head> <body onload="onloadCookie()"> <script type="text/javascript" src="https://www.gstatic.com/_/translate_http/_/js/k=translate_http.tr.en_GB.omlEigW4xY8.O/am=DgY/d=1/exm=corsproxy,phishing_protection/ed=1/rs=AN8SPfpjsL9kUWY0h-sp7Ilu7hZWGwEmeg/m=navigationui" data-environment="prod" data-proxy-url="https://cwe-mitre-org.translate.goog" data-proxy-full-url="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" data-source-url="https://cwe.mitre.org/data/definitions/798.html" data-source-language="pl" data-target-language="lv" data-display-language="en-GB" data-detected-source-language="" data-is-source-untranslated="false" data-source-untranslated-url="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://cwe.mitre.org/data/definitions/798.html&anno=2" data-client="tr"></script><a name="top" id="top"></a> <div id="MastHead" style="width:100%"> <div style="width:60%;float:left;padding-top:15px;padding-left:10px;padding-bottom:2px;"><a href="https://cwe-mitre-org.translate.goog/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" style="color:#32498D; text-decoration:none"> <img src="/images/cwe_logo.jpg" width="153" height="55" style="float:left;border:0;margin-right:6px" alt="CWE"> <h1 style="color:#314a8d;font-size:1.5em;font-family:'Verdana',sans-serif;#eee;margin: .1em auto">Common Weakness Enumeration</h1><p style="color:#314a8d;font-family:'Times New Roman';font-style:italic;font-size:1em;#eee;margin:.1em auto 0 auto">A community-developed list of SW & HW weaknesses that can become vulnerabilities</p></a> </div> <div style="float:right;padding-top:0px;text-align:right;padding-left:8px;padding-right:4px;padding-bottom:0px;"> <a href="https://cwe-mitre-org.translate.goog/about/new_to_cwe.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" title="New to CWE click here logo"><img src="/images/new_to_cwe/new_to_cwe_click_here.png" height="90" border="0" alt="New to CWE? click here!" style="text-align:center"></a> </div> <div style="float:right;padding-top:0px;text-align:right;padding-left:0px;padding-right:4px;padding-bottom:0px;"> <a href="https://cwe-mitre-org.translate.goog/scoring/lists/2021_CWE_MIHW.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" title="CWE Most Important Hardware Weaknesses"> <img src="/images/mihw_logo.svg" width="90" border="0" alt="CWE Most Important Hardware Weaknesses" style="vertical-align:bottom"></a> </div> <div style="float:right;padding-top:0px;text-align:right;padding-left:0px;padding-right:4px;padding-bottom:0px;"> <a href="https://cwe-mitre-org.translate.goog/top25/?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" title="CWE Top 25"><img src="/images/cwe_top_25_logo_simple.svg" width="90" border="0" alt="CWE Top 25 Most Dangerous Weaknesses" style="vertical-align:bottom"></a> </div> </div><!--End Masthead div--> <div id="HeaderBar" class="noprint"> <table width="100%" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td width="100%" align="left" style="padding-left:10px; font-size:75%;"><a href="https://cwe-mitre-org.translate.goog/?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Home</a> > <a href="https://cwe-mitre-org.translate.goog/data/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">CWE List</a> > CWE-798: Use of Hard-coded Credentials (4.16) </td> <td align="right" nowrap style="padding-right:12px"><!-- Begin /includes/search_cwe_id.html --> <div class="noprint"> <form action="/cgi-bin/jumpmenu.cgi" align="right" style="padding:0px; margin:0px"> ID <label for="id" style="padding-right:5px">Lookup:</label> <input id="id" name="id" type="text" style="width:50px; font-size:80%" maxlength="10"> <input value="Go" style="padding: 0px; font-size:80%" type="submit"> </form> </div><!-- End /includes/search_cwe_id.html --></td> </tr> </tbody> </table> </div><!--//HeaderBar--> <div class="yesprint"> <hr width="100%" size="1" style="clear:both" color="#000000"> </div> <div class="topnav"> <ul> <li><a href="https://cwe-mitre-org.translate.goog/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Home</a></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/about/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><button class="dropbtn">About</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/about/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">About</a> <a href="https://cwe-mitre-org.translate.goog/about/new_to_cwe.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">New to CWE</a> <a href="https://cwe-mitre-org.translate.goog/about/user_stories.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">User Stories</a> <a href="https://cwe-mitre-org.translate.goog/about/cwe_videos.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Videos</a> <a href="https://cwe-mitre-org.translate.goog/about/history.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">History</a> <a href="https://cwe-mitre-org.translate.goog/about/documents.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Documents</a> <a href="https://cwe-mitre-org.translate.goog/about/faq.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">FAQs</a> <a href="https://cwe-mitre-org.translate.goog/documents/glossary/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Glossary</a> </div> </div></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/data/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><button class="dropbtn">CWE List</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/data/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Latest Version</a> <a href="https://cwe-mitre-org.translate.goog/data/downloads.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Downloads</a> <a href="https://cwe-mitre-org.translate.goog/data/reports.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Reports</a> <a href="https://cwe-mitre-org.translate.goog/data/pdfs.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Visualizations</a> <a href="https://cwe-mitre-org.translate.goog/data/archive.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Archive</a> </div> </div></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/documents/cwe_usage/guidance.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><button class="dropbtn">Mapping</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/documents/cwe_usage/guidance.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Root Cause Mapping Guidance</a> <a href="https://cwe-mitre-org.translate.goog/documents/cwe_usage/quick_tips.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Root Cause Mapping Quick Tips</a> <a href="https://cwe-mitre-org.translate.goog/documents/cwe_usage/mapping_examples.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Root Cause Mapping Examples</a> </div> </div></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/scoring/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#top_n_lists"><button class="dropbtn">Top-N Lists</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/top25/?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Top 25 Software</a> <a href="https://cwe-mitre-org.translate.goog/scoring/lists/2021_CWE_MIHW.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Top Hardware</a> <a href="https://cwe-mitre-org.translate.goog/top25/archive/2023/2023_kev_list.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Top 10 KEV Weaknesses</a> </div> </div></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/community/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><button class="dropbtn">Community</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/community/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Community</a> <a href="https://cwe-mitre-org.translate.goog/community/working_groups.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Working Groups & Special Interest Groups</a> <a href="https://cwe-mitre-org.translate.goog/community/board.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Board</a> <a href="https://cwe-mitre-org.translate.goog/community/board.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#boardarchives">Board Meeting Minutes</a> <a href="https://cwe-mitre-org.translate.goog/community/registration.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">CWE Discussion List</a> <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.mail-archive.com/cwe-research-list@mitre.org/">CWE Discussion Archives</a> <a href="https://cwe-mitre-org.translate.goog/community/submissions/overview.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Contribute Weakness Content to CWE</a> </div> </div></li> <li> <div class="dropdown"><a href="https://cwe-mitre-org.translate.goog/news/?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><button class="dropbtn">News</button> ▼</a> <div class="dropdown-content"><a href="https://cwe-mitre-org.translate.goog/news/?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Current News</a> <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://twitter.com/CweCapec" target="_blank" rel="noopener noreferrer">X-Twitter <img src="/images/x-logo-black.png" width="12" height="12" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="X-Twitter"></a> <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://mastodon.social/@CWE_Program" target="_blank" rel="noopener noreferrer">Mastodon <img src="/images/mastodon-logo.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="X (formerly Twitter)"></a> <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.linkedin.com/showcase/cve-cwe-capec" target="_blank" rel="noopener noreferrer">LinkedIn <img src="/images/linkedin_sm.jpg" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="LinkedIn"></a> <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA" target="_blank" rel="noopener noreferrer">YouTube <img src="/images/youtube.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="YouTube"></a> <a href="https://cwe-mitre-org.translate.goog/news/podcast.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Podcast <img src="/images/out_of_bounds_read_logo.png" width="16" height="16" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="Out of Bounds Read Podcast"></a> <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://medium.com/@CWE_CAPEC" target="_blank" rel="noopener noreferrer">Medium <img src="/images/medium_sm.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="Medium"></a> <a href="https://cwe-mitre-org.translate.goog/news/archives/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">News Archive</a> </div> </div></li> <li style="border-color:#aaaaaa"><a href="https://cwe-mitre-org.translate.goog/find/index.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Search</a></li> </ul> </div> <table width="100%" border="0" cellspacing="0" cellpadding="0" id="MainPane"> <tbody> <tr><!-- begin left side menu --> <td valign="top" rowspan="2" id="LeftPane"><!--include virtual="/includes/leftsidemenu.html" Removed 11212016--> <script type="text/javascript">browserheight();</script></td><!-- end left side menu --> <td style="height:1px"></td><!-- begin right column --> <td valign="top" align="center" rowspan="2" nowrap id="RightPane"></td><!-- end right side menu --> </tr> <tr><!-- begin content pane --> <td valign="top" width="100%" id="Contentpane"><!--Glossary tags--> <div id="styled_popup" name="styled_popup" style="display:none; position:fixed; top:300; height:auto; width:300px; z-index:1000"> <table width="300" cellpadding="0" cellspacing="0" border="0" style="border:1px solid #32498D;"> <tbody> <tr style="background-color:#32498D; color:#ffffff;"> <td width="100%" style="padding:1px 5px 1px 5px; border-bottom:1px solid #000000"> <div width="100%" style="font-weight:bold;"> CWE Glossary Definition </div></td> <td nowrap style="padding:1px; border-bottom:1px solid #000000" valign="top"><a href="javascript:styledPopupClose();?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img src="/images/layout/close.gif" border="0" alt="x"></a></td> </tr> <tr> <td colspan="2" style="background: url(/images/layout/ylgradient.jpg); background-repeat: repeat-x repeat-y; padding:5px; background-color:#FFFFCC; " valign="top"> <div id="output" style="max-height:400px; overflow-y:auto"></div></td> </tr> </tbody> </table> </div><script src="/includes/nav.js" language="JavaScript" type="text/javascript"></script> <noscript> <style>div.collapseblock { display:inline} </style> </noscript><!-- Start main content --> <!-- Copyright (c) 2006-2024, The MITRE Corporation. CWE and the CWE logo are trademarks of The MITRE Corporation. --> <a xmlns:xhtml="http://www.w3.org/1999/xhtml" name="798"></a> <div style="overflow:auto;"> <h2 style="display:inline; margin:0px 0px 2px 0px; vertical-align: text-bottom">CWE-798: Use of Hard-coded Credentials</h2> <div style="text-align:right; margin:5px 0px 0px 5px; padding-bottom:1px; white-space:nowrap;"></div> </div> <div xmlns:xhtml="http://www.w3.org/1999/xhtml" id="CWEDefinition" class="Weakness"> <div class="title"> <div class="status"> <table cellpadding="0" cellspacing="0" border="0" width="100%"> <tbody> <tr> <td valign="top" align="left" width="33%" nowrap> <div style="font-weight:bold"> Weakness ID: 798 </div><span> <span style="font-weight:bold"> <a href="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#Vulnerability_Mapping_Notes_798">Vulnerability Mapping</a>:<span class="tool"> <span style="color:#4E8F4A">ALLOWED</span> <span class="tip">This CWE ID may be used to map to real-world vulnerabilities</span> </span> </span> <br><span class="tool">Abstraction: <span style="font-weight:normal">Base</span> <span class="tip">Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.</span> </span> </span></td> </tr> </tbody> </table> </div> </div> <div id="Filter_Menu" style="padding-bottom:10px;"> <div style="min-width:580px;display:inline-flex;" class="filterButtonList"> <div style="font-size:80%; color:#000066; font-style:italic; display:inline;height:40px;line-height:40px;min-width:200px;"> View customized information: </div><span class="tool"> <button id="ConceptualButton" type="button" onclick="selectButtonSkin('conceptual');">Conceptual</button> <span class="filter-tip">For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers.</span> </span> <span class="tool"> <button id="OperationalButton" type="button" onclick="selectButtonSkin('operational');">Operational</button> <span class="filter-tip">For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts.</span> </span> <span class="tool"> <button id="MappingFriendlyButton" type="button" onclick="selectButtonSkin('mappingfriendly');">Mapping Friendly</button> <span class="filter-tip">For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers.</span> </span> <span class="tool"> <button id="CompleteButton" type="button" onclick="selectButtonSkin('complete');">Complete</button> <span class="filter-tip">For users who wish to see all available information for the CWE/CAPEC entry.</span> </span> <span class="tool"> <button id="CustomButton" type="button" onclick="openCustomFilterModal();">Custom</button> <span class="filter-tip">For users who want to customize what details are displayed.</span> </span> </div><!-- The Modal --> <div id="customFilterModal" class="custom-filter-modal"><!-- Modal content --> <div class="custom-filter-modal-content"><span class="close" onclick="cancelCustomFilter();">×</span> <br> <h2 id="customFilterHeader" class="custom-filter-header">Edit Custom Filter</h2> <div id="customFilterCategories" class="custom-filter-categories"><button class="modalFilterButton" onclick="selectCategory('conceptual')" title="For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers.">Conceptual</button> <button class="modalFilterButton" onclick="selectCategory('operational')" title="For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts.">Operational</button> <button class="modalFilterButton" onclick="selectCategory('mappingfriendly')" title="For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers.">Mapping Friendly</button> <button class="modalFilterButton" onclick="selectCategory('complete')" title="For users who wish to see all available information for the CWE/CAPEC entry">Select All</button> </div> <div id="customFilterMainBox" class="custom-filter-main-box"> <div id="customFilterLeftBox"> </div> <div id="customFilterRightBox"> </div> </div><br> <div id="customFilterButtons" class="custom-filter-buttons"><button class="modalFilterButton" onclick="defaultCustomFilter()" title="Reset the selected elements to the current custom filter setting.">Reset</button> <button class="modalFilterButton" onclick="clearCustomFilter();" title="Clear all the selected elements so that nothing is selected.">Clear</button> <button class="modalFilterButton" onclick="submitCustomFilter();" title="Submit your changes for the custom filter">Submit</button> <button class="modalFilterButton" onclick="cancelCustomFilter();" title="Cancel all changes made to the custom filter">Cancel</button> </div> </div> </div> <style> div.filterButtonList button { height:25px; border-radius:10px; width: 150px; margin-left:15px; margin-right:15px; } /* The Modal (background) */ .custom-filter-modal { display: none; /* Hidden by default */ position: fixed; /* Stay in place */ z-index: 1; /* Sit on top */ padding-top: 100px; /* Location of the box */ left: 0; top: 0; width: 100%; /* Full width */ height: 100%; /* Full height */ overflow: auto; /* Enable scroll if needed */ background-color: rgb(0,0,0); /* Fallback color */ background-color: rgba(0,0,0,0.4); /* Black w/ opacity */ z-index: 9999; } /* Modal Content */ .custom-filter-modal-content { background-color: #fefefe; margin: auto; padding: 20px; border: 1px solid #888; width: 800px; min-width: 800px; border-radius: 25px; } /* The Close Button */ .close { color: #aaaaaa; float: right; font-size: 28px; font-weight: bold; } .close:hover, .close:focus { color: #000; text-decoration: none; cursor: pointer; } .custom-filter-header, .custom-filter-categories, .custom-filter-main-box, .custom-filter-buttons { padding: 0px; display: flex; align-items: center; justify-content: center; } #customFilterLeftBox { float: left; width: 250px; min-width: 250px; padding: 10px; display: inline-block; } #customFilterRightBox { float: right; width: 250px; min-width: 250px; padding: 10px; display: inline-block; } .modalFilterButton { height:25px !important; border-radius:12px !important; width: 150px !important; margin-left:10px !important; margin-right:10px !important; } </style> <script> // When the user clicks anywhere outside of the modal, close it var modal = document.getElementById("customFilterModal"); window.onclick = function(event) { if (event.target == document.getElementById("customFilterModal")) { modal.style.display = "none"; document.getElementById("customFilterLeftBox").innerHTML = ""; document.getElementById("customFilterRightBox").innerHTML = ""; } } </script> </div> <div id="Description"> <div class="heading" id="Description_798"><span> <a href="javascript:toggleblocksOC('798_Description');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_Description" src="/images/head_more.gif" border="0" alt="+"></a> </span>Description </div> <div name="oc_798_Description" id="oc_798_Description" class="expandblock"> <div class="detail"> <div class="indent"> <table> <tbody> <tr> <td style="width:40%">The product contains hard-coded credentials, such as a password or cryptographic key.</td> <td style="width:60%"><a class="cweimg" href="https://cwe-mitre-org.translate.goog/data/images/CWE-798-Diagram.png?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer"> <img src="/data/images/CWE-798-Diagram.png" alt="Diagram for CWE-798"> </a></td> </tr> </tbody> </table> </div> </div> </div> </div> <div id="Extended_Description"> <div class="heading" id="Extended_Description_798"><span> <a href="javascript:toggleblocksOC('798_Extended_Description');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_Extended_Description" src="/images/head_more.gif" border="0" alt="+"></a> </span>Extended Description </div> <div name="oc_798_Extended_Description" id="oc_798_Extended_Description" class="expandblock"> <div class="detail"> <div class="indent"> <p>There are two main variations:</p> <ul> <li>Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this variant, a default administration account is created, and a simple password is hard-coded into the product and associated with that account. This hard-coded password is the same for each installation of the product, and it usually cannot be changed or disabled by system administrators without manually modifying the program, or otherwise patching the product. It can also be difficult for the administrator to detect.</li> <li>Outbound: the product connects to another system or component, and it contains hard-coded credentials for connecting to that component. This variant applies to front-end systems that authenticate with a back-end service. The back-end service may require a fixed password that can be easily discovered. The programmer may simply hard-code those back-end credentials into the front-end product.</li> </ul> </div> </div> </div> </div> <div id="Common_Consequences"> <div class="heading" id="Common_Consequences_798"> <span><a href="javascript:toggleblocksOC('798_Common_Consequences');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Common_Consequences" src="/images/head_more.gif" border="0" alt="+"></a> </span>Common Consequences </div> <div name="oc_798_Common_Consequences" id="oc_798_Common_Consequences" class="expandblock"> <div class="tabledetail"> <div class="indent"> <span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.</span></span> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="middle" width="135px" nowrap>Scope</th> <th valign="middle">Impact</th> <th valign="middle" width="100px" nowrap>Likelihood</th> </tr> <tr> <td valign="middle" nowrap>Access Control</td> <td valign="middle" width="100%"> <div style="padding-top:5px"> <p class="smaller" style="font-weight:normal"><span class="subheading">Technical Impact: </span><i>Bypass Protection Mechanism</i></p> </div> <div style="padding-top:5px"> <p>If hard-coded passwords are used, it is almost certain that malicious users will gain access to the account in question.</p> <p>Any user of the product that hard-codes passwords may be able to extract the password. Client-side systems with hard-coded passwords pose even more of a threat, since the extraction of a password from a binary is usually very simple.</p> </div></td> <td valign="middle" nowrap></td> </tr> <tr> <td valign="middle" nowrap>Integrity<br> Confidentiality<br> Availability<br> Access Control<br> Other</td> <td valign="middle" width="100%"> <div style="padding-top:5px"> <p class="smaller" style="font-weight:normal"><span class="subheading">Technical Impact: </span><i>Read Application Data; Gain Privileges or Assume Identity; Execute Unauthorized Code or Commands; Other</i></p> </div> <div style="padding-top:5px"> <p>This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.</p> <p>If the password is ever discovered or published (a common occurrence on the Internet), then anybody with knowledge of this password can access the product. Finally, since all installations of the product will have the same password, even across different organizations, this enables massive attacks such as worms to take place.</p> </div></td> <td valign="middle" nowrap></td> </tr> </tbody> </table> </div> </div> </div> </div> <div id="Potential_Mitigations"> <div class="heading" id="Potential_Mitigations_798"> <span><a href="javascript:toggleblocksOC('798_Potential_Mitigations');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Potential_Mitigations" src="/images/head_more.gif" border="0" alt="+"></a> </span>Potential Mitigations </div> <div name="oc_798_Potential_Mitigations" id="oc_798_Potential_Mitigations" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <td valign="top"><p class="subheading">Phase: Architecture and Design</p> <div class="indent"> <p>For outbound authentication: store passwords, keys, and other credentials outside of the code in a strongly-protected, encrypted configuration file or database that is protected from access by all outsiders, including other local users on the same system. Properly protect the key (<a href="https://cwe-mitre-org.translate.goog/data/definitions/320.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">CWE-320</a>). If you cannot use encryption to protect the file, then make sure that the permissions are as restrictive as possible [<a href="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#REF-7_798">REF-7</a>].</p> <p>In Windows environments, the Encrypted File System (EFS) may provide some protection.</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Phase: Architecture and Design</p> <div class="indent"> For inbound authentication: Rather than hard-code a default username and password, key, or other authentication credentials for first time logins, utilize a "first login" mode that requires the user to enter a unique strong password or key. </div></td> </tr> <tr> <td valign="top"><p class="subheading">Phase: Architecture and Design</p> <div class="indent"> If the product must contain hard-coded credentials or they cannot be removed, perform access control checks and limit which entities can access the feature that requires the hard-coded credentials. For example, a feature might only be enabled through the system console instead of through a network connection. </div></td> </tr> <tr> <td valign="top"><p class="subheading">Phase: Architecture and Design</p> <div class="indent"> <p>For inbound authentication using passwords: apply strong one-way hashes to passwords and store those hashes in a configuration file or database with appropriate access control. That way, theft of the file/database still requires the attacker to try to crack the password. When handling an incoming password during authentication, take the hash of the password and compare it to the saved hash.</p> <p>Use randomly assigned salts for each separate hash that is generated. This increases the amount of computation that an attacker needs to conduct a brute-force attack, possibly limiting the effectiveness of the rainbow table method.</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Phase: Architecture and Design</p> <div class="indent"> <p>For front-end to back-end connections: Three solutions are possible, although none are complete.</p> <ul> <li>The first suggestion involves the use of generated passwords or keys that are changed automatically and must be entered at given time intervals by a system administrator. These passwords will be held in memory and only be valid for the time intervals.</li> <li>Next, the passwords or keys should be limited at the back end to only performing actions valid for the front end, as opposed to having full access.</li> <li>Finally, the messages sent should be tagged and checksummed with time sensitive values so as to prevent replay-style attacks.</li> </ul> </div></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Relationships"> <div class="heading" id="Relationships_798"><span> <a href="javascript:toggleblocksOC('798_Relationships');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_Relationships" src="/images/head_more.gif" border="0" alt="+"> </a> </span> Relationships </div> <div name="oc_798_Relationships" id="oc_798_Relationships" class="expandblock"> <div class="detail"> <div class="indent"><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_1000_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_1000_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Research Concepts" (CWE-1000) <div name="oc_798_1000_relevant_table" id="oc_798_1000_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/base.gif" alt="Base" class="icon"> <span class="tip">Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">344</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/344.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Invariant Value in Dynamically Changing Context</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/class.gif" alt="Class" class="icon"> <span class="tip">Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.</span> </span></td> <td valign="top">671</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/671.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Lack of Administrator Control over Security</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/class.gif" alt="Class" class="icon"> <span class="tip">Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.</span> </span></td> <td valign="top">1391</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1391.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Weak Credentials</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">259</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/259.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Password</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">321</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/321.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Cryptographic Key</a></td> </tr> <tr class="primary Weakness"> <td valign="top">PeerOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/base.gif" alt="Base" class="icon"> <span class="tip">Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">257</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/257.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Storing Passwords in a Recoverable Format</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_699_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_699_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Software Development" (CWE-699) <div name="oc_798_699_relevant_table" id="oc_798_699_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"> <span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span> </span></td> <td valign="top">255</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/255.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Credentials Management Errors</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"> <span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span> </span></td> <td valign="top">320</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/320.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Key Management Errors</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_1003_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_1003_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Weaknesses for Simplified Mapping of Published Vulnerabilities" (CWE-1003) <div name="oc_798_1003_relevant_table" id="oc_798_1003_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/class.gif" alt="Class" class="icon"> <span class="tip">Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.</span> </span></td> <td valign="top">287</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/287.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Improper Authentication</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_1008_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_1008_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Architectural Concepts" (CWE-1008) <div name="oc_798_1008_relevant_table" id="oc_798_1008_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"> <span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span> </span></td> <td valign="top">1010</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1010.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Authenticate Actors</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_1305_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_1305_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "CISQ Quality Measures (2020)" (CWE-1305) <div name="oc_798_1305_relevant_table" id="oc_798_1305_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">259</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/259.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Password</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">321</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/321.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Cryptographic Key</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"><span><a href="javascript:toggleblocksOC('798_1340_relevant_table');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_1340_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "CISQ Data Protection Measures" (CWE-1340) <div name="oc_798_1340_relevant_table" id="oc_798_1340_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">259</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/259.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Password</a></td> </tr> <tr class="primary Weakness"> <td valign="top">ParentOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/variant.gif" alt="Variant" class="icon"> <span class="tip">Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource.</span> </span></td> <td valign="top">321</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/321.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Use of Hard-coded Cryptographic Key</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div id="Modes_Of_Introduction"> <div class="heading" id="Modes_Of_Introduction_798"> <span><a href="javascript:toggleblocksOC('798_Modes_Of_Introduction');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Modes_Of_Introduction" src="/images/head_more.gif" border="0" alt="+"></a> </span>Modes Of Introduction </div> <div name="oc_798_Modes_Of_Introduction" id="oc_798_Modes_Of_Introduction" class="expandblock"> <div class="tabledetail"> <div class="indent"> <span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.</span></span> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="middle" width="110px">Phase</th> <th valign="middle">Note</th> </tr> <tr> <td valign="middle" nowrap>Architecture and Design</td> <td valign="middle" width="100%">REALIZATION: This weakness is caused during implementation of an architectural security tactic.</td> </tr> </tbody> </table> </div> </div> </div> </div> <div id="Applicable_Platforms"> <div class="heading" id="Applicable_Platforms_798"> <span><a href="javascript:toggleblocksOC('798_Applicable_Platforms');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Applicable_Platforms" src="/images/head_more.gif" border="0" alt="+"></a> </span>Applicable Platforms </div> <div name="oc_798_Applicable_Platforms" id="oc_798_Applicable_Platforms" class="expandblock"> <div class="detail"> <div class="indent"> <span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.</span></span> <p class="subheading">Languages</p> <div class="indent"> <p>Class: Not Language-Specific <span class="smaller" style="font-style:italic">(Undetermined Prevalence)</span></p> </div> <p class="subheading">Technologies</p> <div class="indent"> <p>Class: Mobile <span class="smaller" style="font-style:italic">(Undetermined Prevalence)</span></p> </div> <div class="indent"> <p>Class: ICS/OT <span class="smaller" style="font-style:italic">(Often Prevalent)</span></p> </div> </div> </div> </div> </div> <div id="Likelihood_Of_Exploit"> <div class="heading" id="Likelihood_Of_Exploit_798"><span> <a href="javascript:toggleblocksOC('798_Likelihood_Of_Exploit');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"> <img id="ocimg_798_Likelihood_Of_Exploit" src="/images/head_more.gif" border="0" alt="+"> </a> </span>Likelihood Of Exploit </div> <div name="oc_798_Likelihood_Of_Exploit" id="oc_798_Likelihood_Of_Exploit" class="expandblock"> <div class="detail"> <div class="indent"> High </div> </div> </div> </div> <div id="Demonstrative_Examples"> <div class="heading" id="Demonstrative_Examples_798"> <span><a href="javascript:toggleblocksOC('798_Demonstrative_Examples');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Demonstrative_Examples" src="/images/head_more.gif" border="0" alt="+"></a> </span>Demonstrative Examples </div> <div name="oc_798_Demonstrative_Examples" id="oc_798_Demonstrative_Examples" class="expandblock"> <div class="detail"> <div class="indent"> <p class="subheading">Example 1</p> <p>The following code uses a hard-coded password to connect to a database:</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>Java </div> </div> <div class="top"> <div> ...<br> DriverManager.getConnection(url, "scott", "tiger");<br> ... </div> </div> </div> </div> </div> <p>This is an example of an external hard-coded password on the client-side of a connection. This code will run successfully, but anyone who has access to it will have access to the password. Once the program has shipped, there is no going back from the database user "scott" with a password of "tiger" unless the program is patched. A devious employee with access to this information can use it to break into the system. Even worse, if attackers have access to the bytecode for application, they can use the javap -c command to access the disassembled code, which will contain the values of the passwords used. The result of this operation might look something like the following for the example above:</p> <div class="indent Attack"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (attack code) </div> <div class="optheading smaller"> </div> </div> <div class="top"> <div> javap -c ConnMngr.class <div style="margin-left:1em;"> 22: ldc #36; //String jdbc:mysql://ixne.com/rxsql<br> 24: ldc #38; //String scott<br> 26: ldc #17; //String tiger </div> </div> </div> </div> </div> </div><br> <p class="subheading">Example 2</p> <p>The following code is an example of an internal hard-coded password in the back-end:</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>C </div> </div> <div class="top"> <div> int VerifyAdmin(char *password) { <div style="margin-left:1em;"> <div> if (strcmp(password, "Mew!")) { <div style="margin-left:1em;"> <div> printf("Incorrect Password!\n");<br> return(0) </div> </div>}<br> printf("Entering Diagnostic Mode...\n");<br> return(1); </div> </div>} </div> </div> </div> </div> </div> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>Java </div> </div> <div class="top"> <div> int VerifyAdmin(String password) { <div style="margin-left:1em;"> if (!password.equals("Mew!")) { <div style="margin-left:1em;"> return(0) </div>}<br> //Diagnostic Mode<br> return(1); </div>} </div> </div> </div> </div> </div> <p>Every instance of this program can be placed into diagnostic mode with the same password. Even worse is the fact that if this program is distributed as a binary-only distribution, it is very difficult to change that password or disable this "functionality."</p><br> <p class="subheading">Example 3</p> <p>The following code examples attempt to verify a password using a hard-coded cryptographic key.</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>C </div> </div> <div class="top"> <div> int VerifyAdmin(char *password) { <div style="margin-left:1em;"> <div> if (strcmp(password,"68af404b513073584c4b6f22b6c63e6b")) { <div style="margin-left:1em;"> <div><br> printf("Incorrect Password!\n");<br> return(0); </div> </div>}<br> printf("Entering Diagnostic Mode...\n");<br> return(1); </div> </div>} </div> </div> </div> </div> </div> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>Java </div> </div> <div class="top"> <div> public boolean VerifyAdmin(String password) { <div style="margin-left:1em;"> if (password.equals("68af404b513073584c4b6f22b6c63e6b")) { <div style="margin-left:1em;"> System.out.println("Entering Diagnostic Mode...");<br> return true; </div>}<br> System.out.println("Incorrect Password!");<br> return false; </div> </div> </div> </div> </div> </div> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>C# </div> </div> <div class="top"> <div> int VerifyAdmin(String password) { <div style="margin-left:1em;"> if (password.Equals("68af404b513073584c4b6f22b6c63e6b")) { <div style="margin-left:1em;"> Console.WriteLine("Entering Diagnostic Mode...");<br> return(1); </div>}<br> Console.WriteLine("Incorrect Password!");<br> return(0); </div>} </div> </div> </div> </div> </div> <p>The cryptographic key is within a hard-coded string value that is compared to the password. It is likely that an attacker will be able to read the key and compromise the system.</p><br> <p class="subheading">Example 4</p> <p>The following examples show a portion of properties and configuration files for Java and ASP.NET applications. The files include username and password information but they are stored in cleartext.</p> <p>This Java example shows a properties file with a cleartext username / password pair.</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>Java </div> </div> <div class="top"> <div><br><i># Java Web App ResourceBundle properties file</i> <br> ...<br> webapp.ldap.username=secretUsername<br> webapp.ldap.password=secretPassword<br> ... </div> </div> </div> </div> </div> <p>The following example shows a portion of a configuration file for an ASP.Net application. This configuration file includes username and password information for a connection to a database but the pair is stored in cleartext.</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7"> (bad code) </div> <div class="optheading smaller"><span style="font-weight:normal; font-style:italic">Example Language: </span>ASP.NET </div> </div> <div class="top"> <div> ...<br> <connectionStrings> <div style="margin-left:1em;"> <add name="ud_DEV" connectionString="connectDB=uDB; uid=db2admin; pwd=password; dbalias=uDB;" providerName="System.Data.Odbc" /> </div></connectionStrings><br> ... </div> </div> </div> </div> </div> <p>Username and password information should not be included in a configuration file or a properties file in cleartext as this will allow anyone who can read the file access to the resource. If possible, encrypt this information.</p><br> <p class="subheading">Example 5</p> <p>In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [<a href="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#REF-1283_798">REF-1283</a>]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.</p> <p>Multiple vendors used hard-coded credentials in their OT products.</p><br> </div> </div> </div> </div> <div id="Observed_Examples"> <div class="heading" id="Observed_Examples_798"> <span><a href="javascript:toggleblocksOC('798_Observed_Examples');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Observed_Examples" src="/images/head_more.gif" border="0" alt="+"></a> </span>Observed Examples </div> <div name="oc_798_Observed_Examples" id="oc_798_Observed_Examples" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <th valign="top" width="165px" nowrap>Reference</th> <th valign="top">Description</th> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-29953" target="_blank" rel="noopener noreferrer">CVE-2022-29953</a> </div></td> <td valign="top"> <div class="indent"> Condition Monitor firmware has a maintenance interface with hard-coded credentials </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-29960" target="_blank" rel="noopener noreferrer">CVE-2022-29960</a> </div></td> <td valign="top"> <div class="indent"> Engineering Workstation uses hard-coded cryptographic keys that could allow for unathorized filesystem access and privilege escalation </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-29964" target="_blank" rel="noopener noreferrer">CVE-2022-29964</a> </div></td> <td valign="top"> <div class="indent"> Distributed Control System (DCS) has hard-coded passwords for local shell access </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-30997" target="_blank" rel="noopener noreferrer">CVE-2022-30997</a> </div></td> <td valign="top"> <div class="indent"> Programmable Logic Controller (PLC) has a maintenance service that uses undocumented, hard-coded credentials </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-30314" target="_blank" rel="noopener noreferrer">CVE-2022-30314</a> </div></td> <td valign="top"> <div class="indent"> Firmware for a Safety Instrumented System (SIS) has hard-coded credentials for access to boot configuration </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2022-30271" target="_blank" rel="noopener noreferrer">CVE-2022-30271</a> </div></td> <td valign="top"> <div class="indent"> Remote Terminal Unit (RTU) uses a hard-coded SSH private key that is likely to be used in typical deployments </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2021-37555" target="_blank" rel="noopener noreferrer">CVE-2021-37555</a> </div></td> <td valign="top"> <div class="indent"> Telnet service for IoT feeder for dogs and cats has hard-coded password [<a href="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#REF-1288_798">REF-1288</a>] </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2021-35033" target="_blank" rel="noopener noreferrer">CVE-2021-35033</a> </div></td> <td valign="top"> <div class="indent"> Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2012-3503" target="_blank" rel="noopener noreferrer">CVE-2012-3503</a> </div></td> <td valign="top"> <div class="indent"> Installation script has a hard-coded secret token value, allowing attackers to bypass authentication </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2010-2772" target="_blank" rel="noopener noreferrer">CVE-2010-2772</a> </div></td> <td valign="top"> <div class="indent"> SCADA system uses a hard-coded password to protect back-end database containing authorization information, exploited by Stuxnet worm </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2010-2073" target="_blank" rel="noopener noreferrer">CVE-2010-2073</a> </div></td> <td valign="top"> <div class="indent"> FTP server library uses hard-coded usernames and passwords for three default accounts </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2010-1573" target="_blank" rel="noopener noreferrer">CVE-2010-1573</a> </div></td> <td valign="top"> <div class="indent"> Chain: Router firmware uses hard-coded username and password for access to debug functionality, which can be used to execute arbitrary code </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2008-2369" target="_blank" rel="noopener noreferrer">CVE-2008-2369</a> </div></td> <td valign="top"> <div class="indent"> Server uses hard-coded authentication key </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2008-0961" target="_blank" rel="noopener noreferrer">CVE-2008-0961</a> </div></td> <td valign="top"> <div class="indent"> Backup product uses hard-coded username and password, allowing attackers to bypass authentication via the RPC interface </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2008-1160" target="_blank" rel="noopener noreferrer">CVE-2008-1160</a> </div></td> <td valign="top"> <div class="indent"> Security appliance uses hard-coded password allowing attackers to gain root access </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2006-7142" target="_blank" rel="noopener noreferrer">CVE-2006-7142</a> </div></td> <td valign="top"> <div class="indent"> Drive encryption product stores hard-coded cryptographic keys for encrypted configuration files in executable programs </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2005-3716" target="_blank" rel="noopener noreferrer">CVE-2005-3716</a> </div></td> <td valign="top"> <div class="indent"> VoIP product uses hard-coded public credentials that cannot be changed, which allows attackers to obtain sensitive information </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2005-3803" target="_blank" rel="noopener noreferrer">CVE-2005-3803</a> </div></td> <td valign="top"> <div class="indent"> VoIP product uses hard coded public and private SNMP community strings that cannot be changed, which allows remote attackers to obtain sensitive information </div></td> </tr> <tr> <td valign="top"> <div><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cve.org/CVERecord?id%3DCVE-2005-0496" target="_blank" rel="noopener noreferrer">CVE-2005-0496</a> </div></td> <td valign="top"> <div class="indent"> Backup product contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system </div></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Weakness_Ordinalities"> <div class="heading" id="Weakness_Ordinalities_798"> <span><a href="javascript:toggleblocksOC('798_Weakness_Ordinalities');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Weakness_Ordinalities" src="/images/head_more.gif" border="0" alt="+"></a> </span>Weakness Ordinalities </div> <div name="oc_798_Weakness_Ordinalities" id="oc_798_Weakness_Ordinalities" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <th valign="top" nowrap>Ordinality</th> <th valign="top" width="100%">Description</th> </tr> <tr> <td valign="top"> <div style="font-size:90%;"> Primary </div></td> <td valign="top"> <div style="font-size:90%; font-style:italic; padding:5px;"> (where the weakness exists independent of other weaknesses) </div></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Detection_Methods"> <div class="heading" id="Detection_Methods_798"> <span><a href="javascript:toggleblocksOC('798_Detection_Methods');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Detection_Methods" src="/images/head_more.gif" border="0" alt="+"></a> </span>Detection Methods </div> <div name="oc_798_Detection_Methods" id="oc_798_Detection_Methods" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <td valign="top"><p class="subheading">Black Box</p> <div class="indent"> Credential storage in configuration files is findable using black box methods, but the use of hard-coded credentials for an incoming authentication routine typically involves an account that is not visible outside of the code. </div> <div class="indent"> <p class="suboptheading">Effectiveness: Moderate</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Automated Static Analysis</p> <div class="indent"> Automated white box techniques have been published for detecting hard-coded credentials for incoming authentication, but there is some expert disagreement regarding their effectiveness and applicability to a broad range of methods. </div> <div class="indent"> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Manual Static Analysis</p> <div class="indent"> This weakness may be detectable using manual code analysis. Unless authentication is decentralized and applied throughout the product, there can be sufficient time for the analyst to find incoming authentication routines and examine the program logic looking for usage of hard-coded credentials. Configuration files could also be analyzed. </div> <div class="indent"> </div> <div class="indent"> <b><span class="smaller">Note: </span></b>These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. </div></td> </tr> <tr> <td valign="top"><p class="subheading">Manual Dynamic Analysis</p> <div class="indent"> <p>For hard-coded credentials in incoming authentication: use monitoring tools that examine the product's process as it interacts with the operating system and the network. This technique is useful in cases when source code is unavailable, if the product was not developed by you, or if you want to verify that the build phase did not introduce any new weaknesses. Examples include debuggers that directly attach to the running process; system-call tracing utilities such as truss (Solaris) and strace (Linux); system activity monitors such as FileMon, RegMon, Process Monitor, and other Sysinternals utilities (Windows); and sniffers and protocol analyzers that monitor network traffic.</p> <p>Attach the monitor to the process and perform a login. Using call trees or similar artifacts from the output, examine the associated behaviors and see if any of them appear to be comparing the input to a fixed string or value.</p> </div> <div class="indent"> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Automated Static Analysis - Binary or Bytecode</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Cost effective for partial coverage: </div> <ul> <li>Bytecode Weakness Analysis - including disassembler + source code weakness analysis</li> <li>Binary Weakness Analysis - including disassembler + source code weakness analysis</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: SOAR Partial</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Manual Static Analysis - Binary or Bytecode</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Highly cost effective: </div> <ul> <li>Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: High</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Dynamic Analysis with Manual Results Interpretation</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Cost effective for partial coverage: </div> <ul> <li>Network Sniffer</li> <li>Forced Path Execution</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: SOAR Partial</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Manual Static Analysis - Source Code</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Highly cost effective: </div> <ul> <li>Focused Manual Spotcheck - Focused manual analysis of source</li> <li>Manual Source Code Review (not inspections)</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: High</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Automated Static Analysis - Source Code</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Highly cost effective: </div> <ul> <li>Source code Weakness Analyzer</li> <li>Context-configured Source Code Weakness Analyzer</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: High</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Automated Static Analysis</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Cost effective for partial coverage: </div> <ul> <li>Configuration Checker</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: SOAR Partial</p> </div></td> </tr> <tr> <td valign="top"><p class="subheading">Architecture or Design Review</p> <div class="indent"> <p>According to SOAR, the following detection techniques may be useful:</p> <div style="margin-left:1em;"> <div> Highly cost effective: </div> <ul> <li>Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)</li> <li>Formal Methods / Correct-By-Construction</li> </ul> </div> </div> <div class="indent"> <p class="suboptheading">Effectiveness: High</p> </div></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Memberships"> <div class="heading" id="Memberships_798"> <span><a href="javascript:toggleblocksOC('798_Memberships');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Memberships" src="/images/head_more.gif" border="0" alt="+"></a> </span>Memberships </div> <div name="oc_798_Memberships" id="oc_798_Memberships" class="expandblock"> <div class="detail"> <div class="indent"><span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.</span></span> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail" style="padding-top:10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tbody> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> </tbody> <tbody> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">254</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/254.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">7PK - Security Features</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">724</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/724.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">753</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/753.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">2009 Top 25 - Porous Defenses</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">803</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/803.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">2010 Top 25 - Porous Defenses</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">812</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/812.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">OWASP Top Ten 2010 Category A3 - Broken Authentication and Session Management</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">861</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/861.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">The CERT Oracle Secure Coding Standard for Java (2011) Chapter 18 - Miscellaneous (MSC)</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">866</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/866.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">2011 Top 25 - Porous Defenses</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">884</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/884.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">CWE Cross-section</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1131</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1131.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">CISQ Quality Measures (2016) - Security</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1152</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1152.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">SEI CERT Oracle Secure Coding Standard for Java - Guidelines 49. Miscellaneous (MSC)</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1200</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1200.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1308</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1308.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">CISQ Quality Measures - Security</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1337</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1337.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1340</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1340.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">CISQ Data Protection Measures</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1350</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1350.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2020 CWE Top 25 Most Dangerous Software Weaknesses</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1353</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1353.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1387</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1387.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2022 CWE Top 25 Most Dangerous Software Weaknesses</a></td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1396</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1396.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Comprehensive Categorization: Access Control</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1425</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1425.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weaknesses</a></td> </tr> <tr class="primary View"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/view.gif" alt="View" class="icon"><span class="tip">View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).</span></span></td> <td valign="top">1430</td> <td valign="top"><a href="https://cwe-mitre-org.translate.goog/data/definitions/1430.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB" target="_blank" rel="noopener noreferrer">Weaknesses in the 2024 CWE Top 25 Most Dangerous Software Weaknesses</a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Vulnerability_Mapping_Notes"> <div class="heading" id="Vulnerability_Mapping_Notes_798"> <span><a href="javascript:toggleblocksOC('798_Vulnerability_Mapping_Notes');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Vulnerability_Mapping_Notes" src="/images/head_more.gif" border="0" alt="+"></a> </span>Vulnerability Mapping Notes </div> <div name="oc_798_Vulnerability_Mapping_Notes" id="oc_798_Vulnerability_Mapping_Notes" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <td><p class="subheading" style="display:inline-block;">Usage: <span style="color:#4E8F4A"> ALLOWED </span></p> <div style="font-size:90%; font-style:italic; padding:5px;display:inline-block;"> (this CWE ID may be used to map to real-world vulnerabilities) </div></td> </tr> <tr> <td valign="top" width="100%"><p><span class="suboptheading">Reason: </span> Acceptable-Use</p></td> </tr> <tr> <td><p class="suboptheading">Rationale:</p> This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.</td> </tr> <tr> <td><p class="suboptheading">Comments:</p>Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.</td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Notes"> <div class="heading" id="Notes_798"> <span><a href="javascript:toggleblocksOC('798_Notes');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Notes" src="/images/head_more.gif" border="0" alt="+"></a> </span>Notes </div> <div name="oc_798_Notes" id="oc_798_Notes" class="expandblock"> <div class="detail"> <div class="indent"> <div class="Maintenance_Note"> <p class="subheading">Maintenance</p> <div class="indent"> The Taxonomy_Mappings to ISA/IEC 62443 were added in CWE 4.10, but they are still under review and might change in future CWE versions. These draft mappings were performed by members of the "Mapping CWE to 62443" subgroup of the CWE-CAPEC ICS/OT Special Interest Group (SIG), and their work is incomplete as of CWE 4.10. The mappings are included to facilitate discussion and review by the broader ICS/OT community, and they are likely to change in future CWE versions. </div> </div> </div> </div> </div> </div> <div id="Taxonomy_Mappings"> <div class="heading" id="Taxonomy_Mappings_798"> <span><a href="javascript:toggleblocksOC('798_Taxonomy_Mappings');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Taxonomy_Mappings" src="/images/head_more.gif" border="0" alt="+"></a> </span>Taxonomy Mappings </div> <div name="oc_798_Taxonomy_Mappings" id="oc_798_Taxonomy_Mappings" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <th valign="top" nowrap width="230px">Mapped Taxonomy Name</th> <th valign="top" nowrap width="100px">Node ID</th> <th valign="top" nowrap>Fit</th> <th valign="top">Mapped Node Name</th> </tr> <tr> <td valign="top">The CERT Oracle Secure Coding Standard for Java (2011)</td> <td valign="top">MSC03-J</td> <td valign="top"></td> <td valign="top">Never hard code sensitive information</td> </tr> <tr> <td valign="top">OMG ASCSM</td> <td valign="top">ASCSM-CWE-798</td> <td valign="top"></td> <td valign="top"></td> </tr> <tr> <td valign="top">ISA/IEC 62443</td> <td valign="top">Part 3-3</td> <td valign="top"></td> <td valign="top">Req SR 1.5</td> </tr> <tr> <td valign="top">ISA/IEC 62443</td> <td valign="top">Part 4-2</td> <td valign="top"></td> <td valign="top">Req CR 1.5</td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Related_Attack_Patterns"> <div class="heading" id="Related_Attack_Patterns_798"> <span><a href="javascript:toggleblocksOC('798_Related_Attack_Patterns');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Related_Attack_Patterns" src="/images/head_more.gif" border="0" alt="+"></a> </span>Related Attack Patterns </div> <div name="oc_798_Related_Attack_Patterns" id="oc_798_Related_Attack_Patterns" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <th valign="top" nowrap width="110px">CAPEC-ID</th> <th valign="top">Attack Pattern Name</th> </tr> <tr> <td valign="top"><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://capec.mitre.org/data/definitions/191.html" target="_blank" rel="noopener noreferrer">CAPEC-191</a></td> <td valign="top">Read Sensitive Constants Within an Executable</td> </tr> <tr> <td valign="top"><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://capec.mitre.org/data/definitions/70.html" target="_blank" rel="noopener noreferrer">CAPEC-70</a></td> <td valign="top">Try Common or Default Usernames and Passwords</td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="References"> <div class="heading" id="References_798"> <span><a href="javascript:toggleblocksOC('798_References');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_References" src="/images/head_more.gif" border="0" alt="+"></a> </span>References </div> <div name="oc_798_References" id="oc_798_References" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tbody> <tr> <td valign="top"> <div id="REF-7_798"> [REF-7] Michael Howard and David LeBlanc. "Writing Secure Code". Chapter 8, "Key Management Issues" Page 272. 2nd Edition. Microsoft Press. 2002-12-04. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223" target="_blank" rel="noopener noreferrer">https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223</a>>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-729_798"> [REF-729] Johannes Ullrich. "Top 25 Series - Rank 11 - Hardcoded Credentials". SANS Software Security Institute. 2010-03-10. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.sans.org/blog/top-25-series-rank-11-hardcoded-credentials/" target="_blank" rel="noopener noreferrer">https://www.sans.org/blog/top-25-series-rank-11-hardcoded-credentials/</a>>. <i>URL validated: 2023-04-07</i>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-172_798"> [REF-172] Chris Wysopal. "Mobile App Top 10 List". 2010-12-13. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.veracode.com/blog/2010/12/mobile-app-top-10-list" target="_blank" rel="noopener noreferrer">https://www.veracode.com/blog/2010/12/mobile-app-top-10-list</a>>. <i>URL validated: 2023-04-07</i>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-962_798"> [REF-962] Object Management Group (OMG). "Automated Source Code Security Measure (ASCSM)". ASCSM-CWE-798. 2016-01. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://www.omg.org/spec/ASCSM/1.0/" target="_blank" rel="noopener noreferrer">http://www.omg.org/spec/ASCSM/1.0/</a>>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-1283_798"> [REF-1283] Forescout Vedere Labs. "OT:ICEFALL: The legacy of "insecure by design" and its implications for certifications and risk management". 2022-06-20. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.forescout.com/resources/ot-icefall-report/" target="_blank" rel="noopener noreferrer">https://www.forescout.com/resources/ot-icefall-report/</a>>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-1288_798"> [REF-1288] Julia Lokrantz. "Ethical hacking of a Smart Automatic Feed Dispenser". 2021-06-07. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://kth.diva-portal.org/smash/get/diva2:1561552/FULLTEXT01.pdf" target="_blank" rel="noopener noreferrer">http://kth.diva-portal.org/smash/get/diva2:1561552/FULLTEXT01.pdf</a>>. </div></td> </tr> <tr> <td valign="top"> <div id="REF-1304_798"> [REF-1304] ICS-CERT. "ICS Alert (ICS-ALERT-13-164-01): Medical Devices Hard-Coded Passwords". 2013-06-13. <<a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.cisa.gov/news-events/ics-alerts/ics-alert-13-164-01" target="_blank" rel="noopener noreferrer">https://www.cisa.gov/news-events/ics-alerts/ics-alert-13-164-01</a>>. <i>URL validated: 2023-04-07</i>. </div></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Content_History"> <div class="heading" id="Content_History_798"> <span><a href="javascript:toggleblocksOC('798_Content_History');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Content_History" src="/images/head_more.gif" border="0" alt="+"></a> </span>Content History </div> <div name="oc_798_Content_History" id="oc_798_Content_History" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <thead class="Submissions"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('798_Submissions');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Submissions" src="/images/head_more.gif" border="0" alt="+"></a> </span>Submissions</th> </tr> </thead> <tbody id="oc_798_Submissions" class="expandblock"> <tr> <th valign="top" style="width:200px;">Submission Date</th> <th valign="top" nowrap>Submitter</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2010-01-15 <br><span class="smaller" style="font-style:italic">(CWE 1.8, 2010-02-16)</span></td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">More abstract entry for hard-coded password and hard-coded cryptographic key.</td> </tr> </tbody> <thead class="Contributions"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('798_Contributions');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Contributions" src="/images/head_more.gif" border="0" alt="+"></a> </span>Contributions</th> </tr> </thead> <tbody id="oc_798_Contributions" class="expandblock"> <tr> <th valign="top">Contribution Date</th> <th valign="top" nowrap>Contributor</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2023-01-24 <br><span class="smaller" style="font-style:italic">(CWE 4.10, 2023-01-31)</span></td> <td valign="top">"Mapping CWE to 62443" Sub-Working Group</td> <td valign="top">CWE-CAPEC ICS/OT SIG</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">Suggested mappings to ISA/IEC 62443.</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2024-02-29 <br><span class="smaller" style="font-style:italic">(CWE 4.15, 2024-07-16)</span></td> <td valign="top">Abhi Balakrishnan</td> <td valign="top"></td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">Provided diagram to improve CWE usability</td> </tr> </tbody> <thead class="Modifications"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('798_Modifications');?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img id="ocimg_798_Modifications" src="/images/head_less.gif" border="0" alt="+"></a> </span>Modifications</th> </tr> </thead> <tbody id="oc_798_Modifications" class="collapseblock"> <tr> <th valign="top">Modification Date</th> <th valign="top" nowrap>Modifier</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2010-04-05</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Related_Attack_Patterns</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2010-06-21</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Common_Consequences, References</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2010-09-27</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Potential_Mitigations</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2010-12-13</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Description</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2011-06-01</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Common_Consequences, Relationships, Taxonomy_Mappings</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2011-06-27</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Observed_Examples, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2011-09-13</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Potential_Mitigations, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2012-05-11</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Demonstrative_Examples, Related_Attack_Patterns, Relationships, Taxonomy_Mappings</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2012-10-30</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Demonstrative_Examples, Potential_Mitigations</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2013-02-21</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Applicable_Platforms, References</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2014-07-30</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Demonstrative_Examples, Detection_Factors</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2015-12-07</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2017-01-19</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Related_Attack_Patterns</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2017-11-08</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Causal_Nature, Demonstrative_Examples, Likelihood_of_Exploit, Modes_of_Introduction, References, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2018-03-27</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated References</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2019-01-03</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated References, Relationships, Taxonomy_Mappings</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2019-06-20</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Related_Attack_Patterns, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2019-09-19</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2020-02-24</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Applicable_Platforms, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2020-08-20</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2020-12-10</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2021-03-15</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Demonstrative_Examples</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2021-07-20</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2021-10-28</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2022-06-28</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2022-10-13</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2023-01-31</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Description, Detection_Factors, Maintenance_Notes, Potential_Mitigations, Taxonomy_Mappings</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2023-04-27</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated References, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2023-06-29</td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Mapping_Notes, Relationships</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2024-02-29 <br><span class="smaller" style="font-style:italic">(CWE 4.14, 2024-02-29)</span></td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Observed_Examples</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2024-07-16 <br><span class="smaller" style="font-style:italic">(CWE 4.15, 2024-07-16)</span></td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Common_Consequences, Description, Diagram</td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3">2024-11-19 <br><span class="smaller" style="font-style:italic">(CWE 4.16, 2024-11-19)</span></td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee">updated Relationships</td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><!-- End main content --> <div id="More_Message_Custom" style="display:none;"> <div style="padding:15px 0px 0px 0px;color:#ff0000;font-size:95%;font-weight:bold;text-align:center;"> More information is available — Please edit the custom filter or select a different filter. </div> </div></td><!-- end content pane --> </tr> </tbody> </table> <div id="FootPane" class="noprint"> <div id="footbar"><b>Page Last Updated: </b> November 19, 2024 </div> <div class="Footer noprint"><a name="footer" id="footer"></a> <table width="100%" cellpadding="0" cellspacing="0" border="0" class="ltgreybackground" style="clear:both"> <tbody> <tr> <td colspan="3" id="line"> <div class="line"> </div></td> </tr> <tr> <td valign="middle" nowrap> <div id="footerlinks" class="footlogo"><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://www.mitre.org" target="_blank" rel="noopener noreferrer"><img src="/images/mitre_logo.gif" height="36" border="0" alt="MITRE" title="MITRE"></a> </div></td> <td width="100%" valign="top" style="padding:6px 0px;"> <div id="footerlinks"><a href="https://cwe-mitre-org.translate.goog/sitemap.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Site Map</a> | <a href="https://cwe-mitre-org.translate.goog/about/termsofuse.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Terms of Use</a> | <a href="https://cwe-mitre-org.translate.goog/data/definitions/798.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB#" onclick="Osano.cm.showDrawer('osano-cm-dom-info-dialog-open')">Manage Cookies</a> | <a href="https://cwe-mitre-org.translate.goog/about/cookie_notice.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Cookie Notice</a> | <a href="https://cwe-mitre-org.translate.goog/about/privacy_policy.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Privacy Policy</a> | <a href="mailto:cwe@mitre.org?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Contact Us</a> | <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://twitter.com/CweCapec"><img src="/images/x-logo-black.png" width="18" height="18" style="border:0;vertical-align:right;" alt="CWE X-Twitter" title="CWE X-Twitter"></a> <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://mastodon.social/@CWE_Program"><img src="/images/mastodon-logo.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE Mastodon" title="CWE Mastodon"></a> <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.linkedin.com/showcase/cve-cwe-capec"><img src="/images/linkedin_sm.jpg" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE on LinkedIn" title="CWE on LinkedIn"></a> <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA"><img src="/images/youtube.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE YouTube channel" title="CWE YouTube Channel"></a> <a href="https://cwe-mitre-org.translate.goog/news/podcast.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB"><img src="/images/out_of_bounds_read_logo.png" width="22" height="22" style="border:0;vertical-align:right;" alt="CWE Out-of-Bounds-Read Podcast" title="CWE Out-of-Bounds-Read Podcast"></a> <a target="_blank" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://medium.com/@CWE_CAPEC"><img src="/images/medium.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE Blog on Medium blog" title="CWE Blog on Medium"></a> </div><p>Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the <a href="https://cwe-mitre-org.translate.goog/about/termsofuse.html?_x_tr_sl=pl&_x_tr_tl=lv&_x_tr_hl=en-GB">Terms of Use</a>. CWE is sponsored by the <a target="_blank" rel="noopener noreferrer" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.dhs.gov/">U.S. Department of Homeland Security</a> (DHS) <a target="_blank" rel="noopener noreferrer" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.dhs.gov/cisa/cybersecurity-division">Cybersecurity and Infrastructure Security Agency</a> (CISA) and managed by the <a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.dhs.gov/science-and-technology/hssedi" target="_blank" rel="noopener noreferrer">Homeland Security Systems Engineering and Development Institute</a> (HSSEDI) which is operated by <a target="_blank" rel="noopener noreferrer" href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=http://www.mitre.org/">The MITRE Corporation</a> (MITRE). Copyright © 2006–2024, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.</p></td> <td valign="middle" nowrap> <div id="footerlinks" class="footlogo"><a href="https://translate.google.com/website?sl=pl&tl=lv&hl=en-GB&u=https://www.dhs.gov/science-and-technology/hssedi" target="_blank" rel="noopener noreferrer"><img src="/images/hssedi.png" height="36" border="0" alt="HSSEDI" title="HSSEDI"></a> </div></td> </tr> </tbody> </table> </div> </div><!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-TCLW30GNGV"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-TCLW30GNGV'); </script> <script>function gtElInit() {var lib = new google.translate.TranslateService();lib.translatePage('pl', 'lv', function () {});}</script> <script src="https://translate.google.com/translate_a/element.js?cb=gtElInit&hl=en-GB&client=wt" type="text/javascript"></script> </body> </html>