20 |
Improper Input Validation |
|
Major |
Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Relationships |
|
Minor |
None |
23 |
Relative Path Traversal |
|
Major |
Relationships |
|
Minor |
None |
36 |
Absolute Path Traversal |
|
Major |
Relationships |
|
Minor |
None |
74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Relationships |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Relationships |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Relationships |
|
Minor |
None |
88 |
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') |
|
Major |
Relationships |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Relationships |
|
Minor |
None |
90 |
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
|
Major |
Relationships |
|
Minor |
None |
91 |
XML Injection (aka Blind XPath Injection) |
|
Major |
Relationships |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Relationships |
|
Minor |
None |
99 |
Improper Control of Resource Identifiers ('Resource Injection') |
|
Major |
Relationships |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Alternate_Terms, Relationships |
|
Minor |
None |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
Alternate_Terms, Relationships |
|
Minor |
None |
123 |
Write-what-where Condition |
|
Major |
Relationships |
|
Minor |
None |
125 |
Out-of-bounds Read |
|
Major |
Observed_Examples, Potential_Mitigations, Relationships |
|
Minor |
None |
129 |
Improper Validation of Array Index |
|
Major |
Potential_Mitigations, Relationships |
|
Minor |
None |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Relationships |
|
Minor |
None |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
Relationships |
|
Minor |
None |
134 |
Use of Externally-Controlled Format String |
|
Major |
Relationships |
|
Minor |
None |
170 |
Improper Null Termination |
|
Major |
Relationships |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Relationships |
|
Minor |
None |
194 |
Unexpected Sign Extension |
|
Major |
Relationships |
|
Minor |
None |
195 |
Signed to Unsigned Conversion Error |
|
Major |
Relationships |
|
Minor |
None |
196 |
Unsigned to Signed Conversion Error |
|
Major |
Relationships |
|
Minor |
None |
197 |
Numeric Truncation Error |
|
Major |
Relationships |
|
Minor |
None |
200 |
Exposure of Sensitive Information to an Unauthorized Actor |
|
Major |
Alternate_Terms, Description, Maintenance_Notes, Related_Attack_Patterns, Relationships |
|
Minor |
None |
201 |
Insertion of Sensitive Information Into Sent Data |
|
Major |
Description, Name |
|
Minor |
None |
203 |
Observable Differences in Behavior to Error Inputs |
|
Major |
Alternate_Terms, Common_Consequences, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships, Research_Gaps |
|
Minor |
None |
205 |
Observable Behavioral Discrepancy |
|
Major |
Relationships |
|
Minor |
None |
226 |
Sensitive Information in Resource Not Removed Before Reuse |
|
Major |
Description, Name, Related_Attack_Patterns, Relationships |
|
Minor |
None |
248 |
Uncaught Exception |
|
Major |
Relationships |
|
Minor |
None |
252 |
Unchecked Return Value |
|
Major |
Relationships |
|
Minor |
None |
259 |
Use of Hard-coded Password |
|
Major |
Relationships |
|
Minor |
None |
260 |
Password in Configuration File |
|
Major |
Relationships |
|
Minor |
None |
262 |
Not Using Password Aging |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
263 |
Password Aging with Long Expiration |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
267 |
Privilege Defined With Unsafe Actions |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Relationships |
|
Minor |
None |
276 |
Incorrect Default Permissions |
|
Major |
Description, Modes_of_Introduction, Potential_Mitigations |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Relationships |
|
Minor |
None |
285 |
Improper Authorization |
|
Major |
Relationships |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Relationships |
|
Minor |
None |
288 |
Authentication Bypass Using an Alternate Path or Channel |
|
Major |
Relationships |
|
Minor |
None |
294 |
Authentication Bypass by Capture-replay |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
295 |
Improper Certificate Validation |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Relationships |
|
Minor |
None |
307 |
Improper Restriction of Excessive Authentication Attempts |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
308 |
Use of Single-factor Authentication |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
309 |
Use of Password System for Primary Authentication |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
320 |
Key Management Errors |
|
Major |
Relationships |
|
Minor |
None |
321 |
Use of Hard-coded Cryptographic Key |
|
Major |
Relationships |
|
Minor |
None |
325 |
Missing Cryptographic Step |
|
Major |
Common_Consequences, Description, Modes_of_Introduction, Name |
|
Minor |
None |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
Relationships |
|
Minor |
None |
347 |
Improper Verification of Cryptographic Signature |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
Relationships |
|
Minor |
None |
359 |
Exposure of Private Personal Information to an Unauthorized Actor |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
|
Major |
Relationships |
|
Minor |
None |
366 |
Race Condition within a Thread |
|
Major |
Relationships |
|
Minor |
None |
369 |
Divide By Zero |
|
Major |
Relationships |
|
Minor |
None |
390 |
Detection of Error Condition Without Action |
|
Major |
Relationships |
|
Minor |
None |
391 |
Unchecked Error Condition |
|
Major |
Relationships |
|
Minor |
None |
392 |
Missing Report of Error Condition |
|
Major |
Relationships |
|
Minor |
None |
394 |
Unexpected Status Code or Return Value |
|
Major |
Relationships |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption |
|
Major |
Relationships |
|
Minor |
None |
401 |
Missing Release of Memory after Effective Lifetime |
|
Major |
Relationships |
|
Minor |
None |
404 |
Improper Resource Shutdown or Release |
|
Major |
Relationships |
|
Minor |
None |
407 |
Inefficient Algorithmic Complexity |
|
Major |
Relationships |
|
Minor |
None |
415 |
Double Free |
|
Major |
Relationships |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Relationships |
|
Minor |
None |
420 |
Unprotected Alternate Channel |
|
Major |
Relationships |
|
Minor |
None |
424 |
Improper Protection of Alternate Path |
|
Major |
Relationships |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Relationships |
|
Minor |
None |
436 |
Interpretation Conflict |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
440 |
Expected Behavior Violation |
|
Major |
Description, Observed_Examples, Theoretical_Notes |
|
Minor |
None |
441 |
Unintended Proxy or Intermediary ('Confused Deputy') |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Potential_Mitigations, References, Relationships |
|
Minor |
None |
456 |
Missing Initialization of a Variable |
|
Major |
Relationships |
|
Minor |
None |
457 |
Use of Uninitialized Variable |
|
Major |
Relationships |
|
Minor |
None |
459 |
Incomplete Cleanup |
|
Major |
Relationships |
|
Minor |
None |
476 |
NULL Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
477 |
Use of Obsolete Function |
|
Major |
Relationships |
|
Minor |
None |
478 |
Missing Default Case in Switch Statement |
|
Major |
Relationships |
|
Minor |
None |
480 |
Use of Incorrect Operator |
|
Major |
Relationships |
|
Minor |
None |
484 |
Omitted Break Statement in Switch |
|
Major |
Relationships |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Relationships |
|
Minor |
None |
502 |
Deserialization of Untrusted Data |
|
Major |
Relationships |
|
Minor |
None |
521 |
Weak Password Requirements |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
522 |
Insufficiently Protected Credentials |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
543 |
Use of Singleton Pattern Without Synchronization in a Multithreaded Context |
|
Major |
Relationships |
|
Minor |
None |
552 |
Files or Directories Accessible to External Parties |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
555 |
J2EE Misconfiguration: Plaintext Password in Configuration File |
|
Major |
Relationships |
|
Minor |
None |
561 |
Dead Code |
|
Major |
Relationships |
|
Minor |
None |
562 |
Return of Stack Variable Address |
|
Major |
Relationships |
|
Minor |
None |
564 |
SQL Injection: Hibernate |
|
Major |
Relationships |
|
Minor |
None |
567 |
Unsynchronized Access to Shared Data in a Multithreaded Context |
|
Major |
Relationships |
|
Minor |
None |
570 |
Expression is Always False |
|
Major |
Relationships |
|
Minor |
None |
571 |
Expression is Always True |
|
Major |
Relationships |
|
Minor |
None |
595 |
Comparison of Object References Instead of Object Contents |
|
Major |
Relationships |
|
Minor |
None |
597 |
Use of Wrong Operator in String Comparison |
|
Major |
Relationships |
|
Minor |
None |
606 |
Unchecked Input for Loop Condition |
|
Major |
Relationships |
|
Minor |
None |
611 |
Improper Restriction of XML External Entity Reference |
|
Major |
Relationships |
|
Minor |
None |
624 |
Executable Regular Expression Error |
|
Major |
Relationships |
|
Minor |
None |
643 |
Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
|
Major |
Relationships |
|
Minor |
None |
652 |
Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') |
|
Major |
Relationships |
|
Minor |
None |
654 |
Reliance on a Single Factor in a Security Decision |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
662 |
Improper Synchronization |
|
Major |
Relationships |
|
Minor |
None |
664 |
Improper Control of a Resource Through its Lifetime |
|
Major |
Relationships |
|
Minor |
None |
665 |
Improper Initialization |
|
Major |
Relationships |
|
Minor |
None |
667 |
Improper Locking |
|
Major |
Relationships |
|
Minor |
None |
672 |
Operation on a Resource after Expiration or Release |
|
Major |
Relationships |
|
Minor |
None |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
Relationships |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
Relationships |
|
Minor |
None |
689 |
Permission Race Condition During Resource Copy |
|
Major |
Relationships |
|
Minor |
None |
693 |
Protection Mechanism Failure |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
697 |
Incorrect Comparison |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
699 |
Software Development |
|
Major |
Relationships |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
704 |
Incorrect Type Conversion or Cast |
|
Major |
Relationships |
|
Minor |
None |
707 |
Improper Neutralization |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Relationships |
|
Minor |
None |
758 |
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior |
|
Major |
Relationships |
|
Minor |
None |
764 |
Multiple Locks of a Critical Resource |
|
Major |
Relationships |
|
Minor |
None |
772 |
Missing Release of Resource after Effective Lifetime |
|
Major |
Relationships |
|
Minor |
None |
775 |
Missing Release of File Descriptor or Handle after Effective Lifetime |
|
Major |
Relationships |
|
Minor |
None |
778 |
Insufficient Logging |
|
Major |
Relationships |
|
Minor |
None |
783 |
Operator Precedence Logic Error |
|
Major |
Relationships |
|
Minor |
None |
786 |
Access of Memory Location Before Start of Buffer |
|
Major |
Relationships |
|
Minor |
None |
787 |
Out-of-bounds Write |
|
Major |
Alternate_Terms, Demonstrative_Examples, Observed_Examples, Relationships |
|
Minor |
None |
788 |
Access of Memory Location After End of Buffer |
|
Major |
Relationships |
|
Minor |
None |
789 |
Uncontrolled Memory Allocation |
|
Major |
Relationships |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Relationships |
|
Minor |
None |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
Relationships |
|
Minor |
None |
820 |
Missing Synchronization |
|
Major |
Relationships |
|
Minor |
None |
821 |
Incorrect Synchronization |
|
Major |
Relationships |
|
Minor |
None |
822 |
Untrusted Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
823 |
Use of Out-of-range Pointer Offset |
|
Major |
Relationships |
|
Minor |
None |
824 |
Access of Uninitialized Pointer |
|
Major |
Relationships |
|
Minor |
None |
825 |
Expired Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
833 |
Deadlock |
|
Major |
Relationships |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Relationships |
|
Minor |
None |
836 |
Use of Password Hash Instead of Password for Authentication |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
862 |
Missing Authorization |
|
Major |
Relationships |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Relationships |
|
Minor |
None |
888 |
Software Fault Pattern (SFP) Clusters |
|
Major |
Relationships |
|
Minor |
None |
908 |
Use of Uninitialized Resource |
|
Major |
Relationships |
|
Minor |
None |
917 |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') |
|
Major |
Relationships |
|
Minor |
None |
1021 |
Improper Restriction of Rendered UI Layers or Frames |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1041 |
Use of Redundant Code |
|
Major |
Relationships |
|
Minor |
None |
1042 |
Static Member Data Element outside of a Singleton Class Element |
|
Major |
Relationships |
|
Minor |
None |
1043 |
Data Element Aggregating an Excessively Large Number of Non-Primitive Elements |
|
Major |
Relationships |
|
Minor |
None |
1045 |
Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor |
|
Major |
Relationships |
|
Minor |
None |
1046 |
Creation of Immutable Text Using String Concatenation |
|
Major |
Relationships |
|
Minor |
None |
1047 |
Modules with Circular Dependencies |
|
Major |
Relationships |
|
Minor |
None |
1048 |
Invokable Control Element with Large Number of Outward Calls |
|
Major |
Relationships |
|
Minor |
None |
1049 |
Excessive Data Query Operations in a Large Data Table |
|
Major |
Relationships |
|
Minor |
None |
1050 |
Excessive Platform Resource Consumption within a Loop |
|
Major |
Relationships |
|
Minor |
None |
1051 |
Initialization with Hard-Coded Network Resource Configuration Data |
|
Major |
Relationships |
|
Minor |
None |
1052 |
Excessive Use of Hard-Coded Literals in Initialization |
|
Major |
Relationships |
|
Minor |
None |
1054 |
Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer |
|
Major |
Relationships |
|
Minor |
None |
1055 |
Multiple Inheritance from Concrete Classes |
|
Major |
Relationships |
|
Minor |
None |
1057 |
Data Access Operations Outside of Expected Data Manager Component |
|
Major |
Relationships |
|
Minor |
None |
1058 |
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element |
|
Major |
Relationships |
|
Minor |
None |
1060 |
Excessive Number of Inefficient Server-Side Data Accesses |
|
Major |
Relationships |
|
Minor |
None |
1062 |
Parent Class with References to Child Class |
|
Major |
Relationships |
|
Minor |
None |
1064 |
Invokable Control Element with Signature Containing an Excessive Number of Parameters |
|
Major |
Relationships |
|
Minor |
None |
1066 |
Missing Serialization Control Element |
|
Major |
Relationships |
|
Minor |
None |
1067 |
Excessive Execution of Sequential Searches of Data Resource |
|
Major |
Relationships |
|
Minor |
None |
1070 |
Serializable Data Element Containing non-Serializable Item Elements |
|
Major |
Relationships |
|
Minor |
None |
1072 |
Data Resource Access without Use of Connection Pooling |
|
Major |
Relationships |
|
Minor |
None |
1073 |
Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses |
|
Major |
Relationships |
|
Minor |
None |
1074 |
Class with Excessively Deep Inheritance |
|
Major |
Relationships |
|
Minor |
None |
1075 |
Unconditional Control Flow Transfer outside of Switch Block |
|
Major |
Relationships |
|
Minor |
None |
1077 |
Floating Point Comparison with Incorrect Operator |
|
Major |
Relationships |
|
Minor |
None |
1079 |
Parent Class without Virtual Destructor Method |
|
Major |
Relationships |
|
Minor |
None |
1080 |
Source Code File with Excessive Number of Lines of Code |
|
Major |
Relationships |
|
Minor |
None |
1082 |
Class Instance Self Destruction Control Element |
|
Major |
Relationships |
|
Minor |
None |
1083 |
Data Access from Outside Expected Data Manager Component |
|
Major |
Relationships |
|
Minor |
None |
1084 |
Invokable Control Element with Excessive File or Data Access Operations |
|
Major |
Relationships |
|
Minor |
None |
1085 |
Invokable Control Element with Excessive Volume of Commented-out Code |
|
Major |
Relationships |
|
Minor |
None |
1086 |
Class with Excessive Number of Child Classes |
|
Major |
Relationships |
|
Minor |
None |
1087 |
Class with Virtual Method without a Virtual Destructor |
|
Major |
Relationships |
|
Minor |
None |
1088 |
Synchronous Access of Remote Resource without Timeout |
|
Major |
Relationships |
|
Minor |
None |
1089 |
Large Data Table with Excessive Number of Indices |
|
Major |
Relationships |
|
Minor |
None |
1090 |
Method Containing Access of a Member Element from Another Class |
|
Major |
Relationships |
|
Minor |
None |
1091 |
Use of Object without Invoking Destructor Method |
|
Major |
Relationships |
|
Minor |
None |
1094 |
Excessive Index Range Scan for a Data Resource |
|
Major |
Relationships |
|
Minor |
None |
1095 |
Loop Condition Value Update within the Loop |
|
Major |
Relationships |
|
Minor |
None |
1096 |
Singleton Class Instance Creation without Proper Locking or Synchronization |
|
Major |
Relationships |
|
Minor |
None |
1097 |
Persistent Storable Data Element without Associated Comparison Control Element |
|
Major |
Relationships |
|
Minor |
None |
1098 |
Data Element containing Pointer Item without Proper Copy Control Element |
|
Major |
Relationships |
|
Minor |
None |
1189 |
Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
|
Major |
Common_Consequences, Description, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1190 |
DMA Device Enabled Too Early in Boot Phase |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1191 |
Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1192 |
System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers |
|
Major |
Description |
|
Minor |
None |
1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
None |
1195 |
Manufacturing and Life Cycle Management Concerns |
|
Major |
Relationships |
|
Minor |
None |
1197 |
Integration Issues |
|
Major |
Description |
|
Minor |
None |
1198 |
Privilege Separation and Access Control Issues |
|
Major |
Relationships |
|
Minor |
None |
1199 |
General Circuit and Logic Design Concerns |
|
Major |
Relationships |
|
Minor |
None |
1201 |
Core and Compute Issues |
|
Major |
Relationships |
|
Minor |
None |
1206 |
Power, Clock, and Reset Concerns |
|
Major |
Relationships |
|
Minor |
None |
1207 |
Debug and Test Problems |
|
Major |
Relationships |
|
Minor |
None |
1208 |
Cross-Cutting Problems |
|
Major |
Relationships |
|
Minor |
None |
1209 |
Failure to Disable Reserved Bits |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1220 |
Insufficient Granularity of Access Control |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1223 |
Race Condition for Write-Once Attributes |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1224 |
Improper Restriction of Write-Once Bit Fields |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1231 |
Improper Implementation of Lock Protection Registers |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1232 |
Improper Lock Behavior After Power State Transition |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1236 |
Improper Neutralization of Formula Elements in a CSV File |
|
Major |
Relationships |
|
Minor |
None |
1237 |
SFP Primary Cluster: Faulty Resource Release |
|
Major |
Relationships |
|
Minor |
None |
1238 |
SFP Primary Cluster: Failure to Release Memory |
|
Major |
Relationships |
|
Minor |
None |
1239 |
Improper Zeroization of Hardware Register |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1240 |
Use of a Risky Cryptographic Primitive |
|
Major |
Background_Details, Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns, Research_Gaps |
|
Minor |
None |
1241 |
Use of Predictable Algorithm in Random Number Generator |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns, Research_Gaps |
|
Minor |
None |
1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1243 |
Sensitive Non-Volatile Information Not Protected During Debug |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1244 |
Improper Access to Sensitive Information Using Debug and Test Interfaces |
|
Major |
Demonstrative_Examples, Name, Observed_Examples, Related_Attack_Patterns |
|
Minor |
None |
1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
Major |
Demonstrative_Examples, Description, Potential_Mitigations, Research_Gaps |
|
Minor |
None |
1247 |
Missing or Improperly Implemented Protection Against Voltage and Clock Glitches |
|
Major |
Demonstrative_Examples, Description, Name, Observed_Examples, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
Major |
Modes_of_Introduction, Related_Attack_Patterns |
|
Minor |
None |
1251 |
Mirrored Regions with Different Values |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Research_Gaps |
|
Minor |
None |
1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1253 |
Incorrect Selection of Fuse Values |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description |
|
Minor |
None |
1254 |
Incorrect Comparison Logic Granularity |
|
Major |
Relationships |
|
Minor |
None |
1256 |
Hardware Features Enable Physical Attacks from Software |
|
Major |
Demonstrative_Examples, Description, Maintenance_Notes, Related_Attack_Patterns |
|
Minor |
None |
1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information |
|
Major |
Demonstrative_Examples, Description, Name, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1259 |
Improper Restriction of Security Token Assignment |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Related_Attack_Patterns |
|
Minor |
None |
1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1263 |
Improper Physical Access Control |
|
Major |
Common_Consequences, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns |
|
Minor |
None |
1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
|
Major |
Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1267 |
Policy Uses Obsolete Encoding |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations |
|
Minor |
None |
1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1269 |
Product Released in Non-Release Configuration |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
1270 |
Generation of Incorrect Security Tokens |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Relationships |
|
Minor |
None |
1271 |
Unitialized Value on Reset for Registers Holding Security Settings |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1272 |
Sensitive Information Uncleared Before Debug/Power State Transition |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1273 |
Device Unlock Credential Sharing |
|
Major |
Demonstrative_Examples, Description, Related_Attack_Patterns |
|
Minor |
None |
1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
|
Major |
Demonstrative_Examples, Description, Related_Attack_Patterns |
|
Minor |
None |
1275 |
Sensitive Cookie with Improper SameSite Attribute |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns |
|
Minor |
None |
1276 |
Hardware Child Block Incorrectly Connected to Parent System |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations |
|
Minor |
None |
1277 |
Firmware Not Updateable |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Potential_Mitigations |
|
Minor |
None |
1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, References, Related_Attack_Patterns |
|
Minor |
None |
1279 |
Cryptographic Operations are run Before Supporting Units are Ready |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1280 |
Access Control Check Implemented After Asset is Accessed |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Related_Attack_Patterns |
|
Minor |
None |
1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior (Halt and Catch Fire) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction, Name |
|
Minor |
None |
1283 |
Mutable Attestation or Measurement Reporting Data |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
None |
1286 |
Improper Validation of Syntactic Correctness of Input |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |