[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Weak Cryptography for Passwords

ID: 261Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Variant





Description

Obscuring a password with a trivial encoding does not protect the password.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Gain privileges / assume identity
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
  Passwords should be encrypted with keys that are at least 128 bits in length for adequate security.
 
  

Relationships

Related CWETypeViewChain
CWE-261 ChildOf CWE-903 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following code reads a password from a properties file and uses the password to connect to a database.
  2. The following code reads a password from the registry and uses the password to create a new network credential.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
7 Pernicious Kingdoms  Password Management: Weak Cryptography
 
 
OWASP Top Ten 2004 A8
 
Insecure Storage
 
CWE_More_Specific
 

References:

  1. John Viega Gary McGraw .Building Secure Software: How to Avoid Security Problems the Right Way 1st Edition. Addison-Wesley. Published on 2002.
  2. Michael Howard David LeBlanc John Viega .24 Deadly Sins of Software Security. McGraw-Hill. Section:'"Sin 19: Use of Weak Password-Based Systems." Page 279'. Published on 2010.
CVE    1
CVE-2020-10919

© SecPod Technologies