CWE-370: Missing Check for Certificate Revocation after Initial Check
ID
CWE-370
Abstraction
Variant
Structure
Simple
Status
Draft
The product does not check the revocation status of a certificate after its initial revocation check, which can cause the product to perform privileged actions even after the certificate is revoked at a later time.
If the revocation status of a certificate is not checked before each action that requires privileges, the system may be subject to a race condition. If a certificate is revoked after the initial check, all subsequent actions taken with the owner of the revoked certificate will lose all benefits guaranteed by the certificate. In fact, it is almost certain that the use of a revoked certificate indicates malicious activity.
Modes of Introduction
Phase | Note |
---|---|
Implementation |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific |
Relationships
View | Weakness | |||||||
---|---|---|---|---|---|---|---|---|
# ID | View | Status | # ID | Name | Abstraction | Structure | Status | |
CWE-1000 | Research Concepts | Draft | CWE-299 | Improper Check for Certificate Revocation | Base | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-296 | Improper Following of a Certificate's Chain of Trust | Base | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-297 | Improper Validation of Certificate with Host Mismatch | Variant | Simple | Incomplete | |
CWE-1000 | Research Concepts | Draft | CWE-298 | Improper Validation of Certificate Expiration | Variant | Simple | Draft |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.org
Loading...