[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Missing Support for Integrity Check

ID: 353Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The software uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.

Extended Description

If integrity check values or "checksums" are omitted from a protocol, there is no way of determining if data has been corrupted in transmission. The lack of checksum functionality in a protocol removes the first application-level check of data that can be used. The end-to-end philosophy of checks states that integrity checks should be performed at the lowest level that they can be completely implemented. Excluding further sanity checks and input validation performed by applications, the protocol's checksum is the most important level of checksum, since it can be performed more completely than at any previous level and takes into account entire messages, as opposed to single packets.

Likelihood of Exploit: Medium

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Integrity
Other
 
Other
 
Data that is parsed and used may be corrupted.
 
Non-Repudiation
Other
 
Hide activities
Other
 
Without a checksum it is impossible to determine if any changes have been made to the data after it was sent.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 Add an appropriately sized checksum to the protocol, ensuring that data received may be simply validated before it is parsed and used.
 
  
Implementation
 
 Ensure that the checksums present in the protocol design are properly implemented and added to each message before it is sent.
 
  

Relationships

Related CWETypeViewChain
CWE-353 ChildOf CWE-902 Category CWE-888  

Demonstrative Examples   (Details)

  1. In this example, a request packet is received, and privileged information is sent to the requester:

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
CLASP  Failure to add integrity check value
 
 

References:

  1. Michael Howard David LeBlanc John Viega .24 Deadly Sins of Software Security. McGraw-Hill. Section:'"Sin 15: Not Updating Easily." Page 231'. Published on 2010.
CVE    2
CVE-2021-28545
CVE-2021-28546

© SecPod Technologies