CWE-1293: Missing Source Correlation of Multiple Independent Data

ID CWE-1293
Abstraction Base
Structure Simple
Status Draft
The product relies on one source of data, preventing the ability to detect if an adversary has compromised a data source.

To operate successfully, a product sometimes has to implicitly trust the integrity of an information source. When information is implicitly signed, one can ensure that the data was not tampered in transit. This does not ensure that the information source was not compromised when responding to a request. By requesting information from multiple sources, one can check if all of the data is the same. If they are not, the system should report the information sources that respond with a different or minority value as potentially compromised. If there are not enough answers to provide a majority or plurality of responses, the system should report all of the sources as potentially compromised. As the seriousness of the impact of incorrect integrity increases, so should the number of independent information sources that would need to be queried.

Modes of Introduction

Phase Note
Architecture and Design This flaw could be introduced during the design of the application or misconfiguration at run time by only specifying a single point of validation.
Implementation Such issues could be introduced during hardware implementation, then identified later during Testing or System Configuration phases.
Operation This weakness could be introduced by intentionally failing all but one of the devices used to retrieve the data or by failing the devices that validate the data.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific
Operating_system Not OS-Specific
Architecture Not Architecture-Specific
Technology Not Technology-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-345 Insufficient Verification of Data Authenticity Class Simple Draft
CWE-1000 Research Concepts Draft CWE-654 Reliance on a Single Factor in a Security Decision Base Simple Draft
Loading...
Loading...