Scope | Impact | Likelihood |
---|---|---|
Access Control Confidentiality | Bypass Protection Mechanism, Read Application Data Note: An attacker may be able to decrypt the data using brute force attacks. |
References | Description |
---|---|
CVE-2001-1546 | Weak encryption |
CVE-2004-2172 | Weak encryption (chosen plaintext attack) |
CVE-2002-1682 | Weak encryption |
CVE-2002-1697 | Weak encryption produces same ciphertext from the same plaintext blocks. |
CVE-2002-1739 | Weak encryption |
CVE-2005-2281 | Weak encryption scheme |
CVE-2002-1872 | Weak encryption (XOR) |
CVE-2002-1910 | Weak encryption (reversible algorithm). |
CVE-2002-1946 | Weak encryption (one-to-one mapping). |
CVE-2002-1975 | Encryption error uses fixed salt, simplifying brute force / dictionary attacks (overlaps randomness). |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-112 | Brute Force In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a value that is functionally equivalent) that will unlock the asset. |
CAPEC-192 | Protocol Analysis An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analysis of a networking protocol inherently, it does not require the presence of an actual or physical network. |
CAPEC-20 | Encryption Brute Forcing An attacker, armed with the cipher text and the encryption algorithm used, performs an exhaustive (brute force) search on the key space to determine the key that decrypts the cipher text to obtain the plaintext. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Veracode | Suggested OWASP Top Ten 2004 mapping | ||
CWE Content Team | MITRE | updated Maintenance_Notes, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | Clarified entry to focus on algorithms that do not have major weaknesses, but may not be strong enough for some purposes. | |
CWE Content Team | MITRE | updated Common_Consequences, Description, Maintenance_Notes, Name | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated References, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Applicable_Platforms, Modes_of_Introduction, References, Relationships | |
CWE Content Team | MITRE | updated References, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Maintenance_Notes, Potential_Mitigations, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description, Relationships | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |