CWE-370: Missing Check for Certificate Revocation after Initial Check

ID CWE-370
Abstraction Variant
Structure Simple
Status Draft
The product does not check the revocation status of a certificate after its initial revocation check, which can cause the product to perform privileged actions even after the certificate is revoked at a later time.

If the revocation status of a certificate is not checked before each action that requires privileges, the system may be subject to a race condition. If a certificate is revoked after the initial check, all subsequent actions taken with the owner of the revoked certificate will lose all benefits guaranteed by the certificate. In fact, it is almost certain that the use of a revoked certificate indicates malicious activity.

Modes of Introduction

Phase Note
Implementation

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-299 Improper Check for Certificate Revocation Base Simple Draft
CWE-1000 Research Concepts Draft CWE-296 Improper Following of a Certificate's Chain of Trust Base Simple Draft
CWE-1000 Research Concepts Draft CWE-297 Improper Validation of Certificate with Host Mismatch Variant Simple Incomplete
CWE-1000 Research Concepts Draft CWE-298 Improper Validation of Certificate Expiration Variant Simple Draft

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-26 Leveraging Race Conditions CWE-370
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions CWE-370
Loading...
Loading...