CWE-321: Use of Hard-coded Cryptographic Key
ID
CWE-321
Abstraction
Variant
Structure
Simple
Status
Draft
Number of CVEs
113
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
Modes of Introduction
Phase | Note |
---|---|
Architecture and Design | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific | ||
Technology | ICS/OT |
Relationships
View | Weakness | |||||||
---|---|---|---|---|---|---|---|---|
# ID | View | Status | # ID | Name | Abstraction | Structure | Status | |
CWE-1000 | Research Concepts | Draft | CWE-798 | Use of Hard-coded Credentials | Base | Simple | Draft | |
CWE-1305 | CISQ Quality Measures (2020) | Incomplete | CWE-798 | Use of Hard-coded Credentials | Base | Simple | Draft | |
CWE-1340 | CISQ Data Protection Measures | Incomplete | CWE-798 | Use of Hard-coded Credentials | Base | Simple | Draft |
CVEs Published
CVSS Severity
CVSS Severity - By Year
CVSS Base Score
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |
Loading...