CWE-319: Cleartext Transmission of Sensitive Information
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
常见后果
影响范围: Integrity Confidentiality
技术影响: Read Application Data Modify Files or Directories
说明: Anyone can read the information by gaining access to the channel being used for communication. Many communication channels can be "sniffed" (monitored) by adversaries during data transmission. For example, in networking, packets can traverse many intermediary nodes from the source to the destination, whether across the internet, an internal network, the cloud, etc. Some actors might have privileged access to a network interface or any link along the channel, such as a router, but they might not be authorized to collect the underlying data. As a result, network traffic could be sniffed by adversaries, spilling security-critical data.
影响范围: Integrity Confidentiality
技术影响: Read Application Data Modify Files or Directories Other
说明: When full communications are recorded or logged, such as with a packet dump, an adversary could attempt to obtain the dump long after the transmission has occurred and try to "sniff" the cleartext from the recorded communications in the dump itself. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
潜在缓解措施
阶段: Architecture and Design
描述: Before transmitting, encrypt the data using reliable, confidentiality-protecting cryptographic protocols.
阶段: Implementation
描述: When using web applications with SSL, use SSL for the entire session from login to logout, not just for the initial login page.
阶段: Implementation
描述: When designing hardware platforms, ensure that approved encryption algorithms (such as those recommended by NIST) protect paths from security critical data to trusted user applications.
阶段: Testing
描述: Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.
阶段: Operation
描述: Configure servers to use encrypted channels for communication, which may include SSL or other secure protocols.
检测方法
方法: Black Box
方法: Automated Static Analysis
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
有效性: High
观察示例
参考: CVE-2022-29519
Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens.
参考: CVE-2022-30312
Building Controller uses a protocol that transmits authentication credentials in plaintext.
参考: CVE-2022-31204
Programmable Logic Controller (PLC) sends password in plaintext.
参考: CVE-2002-1949
Passwords transmitted in cleartext.
参考: CVE-2008-4122
Chain: Use of HTTPS cookie without "secure" flag causes it to be transmitted across unencrypted HTTP.
参考: CVE-2008-3289
Product sends password hash in cleartext in violation of intended policy.
参考: CVE-2008-4390
Remote management feature sends sensitive information including passwords in cleartext.
参考: CVE-2007-5626
Backup routine sends password in cleartext in email.
参考: CVE-2004-1852
Product transmits Blowfish encryption key in cleartext.
参考: CVE-2008-0374
Printer sends configuration information, including administrative password, in cleartext.
参考: CVE-2007-4961
Chain: cleartext transmission of the MD5 hash of password enables attacks against a server that is susceptible to replay (CWE-294).
参考: CVE-2007-4786
Product sends passwords in cleartext to a log server.
参考: CVE-2005-3140
Product sends file with cleartext passwords in e-mail message intended for diagnostic purposes.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase. |
| Architecture and Design | For hardware, this may be introduced when design does not plan for an attacker having physical access while a legitimate user is remotely operating the device. |
| Operation | - |
| System Configuration | - |
适用平台
编程语言
技术
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Plaintext Transmission of Sensitive Information | - |
| The CERT Oracle Secure Coding Standard for Java (2011) | SEC06-J | Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar | - |
| The CERT Oracle Secure Coding Standard for Java (2011) | SER02-J | Sign then seal sensitive objects before sending them outside a trust boundary | - |
| Software Fault Patterns | SFP23 | Exposed Data | - |
| ISA/IEC 62443 | Part 3-3 | Req SR 4.1 | - |
| ISA/IEC 62443 | Part 4-2 | Req CR 4.1B | - |
关键信息
CWE ID: CWE-319
抽象级别: Base
结构: Simple
状态: Draft
利用可能性: High