CWE-319: Cleartext Transmission of Sensitive Information

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

常见后果

影响范围: Integrity Confidentiality

技术影响: Read Application Data Modify Files or Directories

说明: Anyone can read the information by gaining access to the channel being used for communication. Many communication channels can be "sniffed" (monitored) by adversaries during data transmission. For example, in networking, packets can traverse many intermediary nodes from the source to the destination, whether across the internet, an internal network, the cloud, etc. Some actors might have privileged access to a network interface or any link along the channel, such as a router, but they might not be authorized to collect the underlying data. As a result, network traffic could be sniffed by adversaries, spilling security-critical data.

影响范围: Integrity Confidentiality

技术影响: Read Application Data Modify Files or Directories Other

说明: When full communications are recorded or logged, such as with a packet dump, an adversary could attempt to obtain the dump long after the transmission has occurred and try to "sniff" the cleartext from the recorded communications in the dump itself. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.

潜在缓解措施

阶段: Architecture and Design

描述: Before transmitting, encrypt the data using reliable, confidentiality-protecting cryptographic protocols.

阶段: Implementation

描述: When using web applications with SSL, use SSL for the entire session from login to logout, not just for the initial login page.

阶段: Implementation

描述: When designing hardware platforms, ensure that approved encryption algorithms (such as those recommended by NIST) protect paths from security critical data to trusted user applications.

阶段: Testing

描述: Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.

阶段: Operation

描述: Configure servers to use encrypted channels for communication, which may include SSL or other secure protocols.

检测方法

方法: Black Box

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2022-29519

Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens.

参考: CVE-2022-30312

Building Controller uses a protocol that transmits authentication credentials in plaintext.

参考: CVE-2022-31204

Programmable Logic Controller (PLC) sends password in plaintext.

参考: CVE-2002-1949

Passwords transmitted in cleartext.

参考: CVE-2008-4122

Chain: Use of HTTPS cookie without "secure" flag causes it to be transmitted across unencrypted HTTP.

参考: CVE-2008-3289

Product sends password hash in cleartext in violation of intended policy.

参考: CVE-2008-4390

Remote management feature sends sensitive information including passwords in cleartext.

参考: CVE-2007-5626

Backup routine sends password in cleartext in email.

参考: CVE-2004-1852

Product transmits Blowfish encryption key in cleartext.

参考: CVE-2008-0374

Printer sends configuration information, including administrative password, in cleartext.

参考: CVE-2007-4961

Chain: cleartext transmission of the MD5 hash of password enables attacks against a server that is susceptible to replay (CWE-294).

参考: CVE-2007-4786

Product sends passwords in cleartext to a log server.

参考: CVE-2005-3140

Product sends file with cleartext passwords in e-mail message intended for diagnostic purposes.

引入模式

阶段 说明
Architecture and Design OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.
Architecture and Design For hardware, this may be introduced when design does not plan for an attacker having physical access while a legitimate user is remotely operating the device.
Operation -
System Configuration -

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
Cloud Computing (Undetermined) Mobile (Undetermined) ICS/OT (Often) System on Chip (Undetermined) Test/Debug Hardware (Often)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Plaintext Transmission of Sensitive Information -
The CERT Oracle Secure Coding Standard for Java (2011) SEC06-J Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar -
The CERT Oracle Secure Coding Standard for Java (2011) SER02-J Sign then seal sensitive objects before sending them outside a trust boundary -
Software Fault Patterns SFP23 Exposed Data -
ISA/IEC 62443 Part 3-3 Req SR 4.1 -
ISA/IEC 62443 Part 4-2 Req CR 4.1B -
关键信息

CWE ID: CWE-319

抽象级别: Base

结构: Simple

状态: Draft

利用可能性: High

相关弱点
相关攻击模式
CAPEC-102 CAPEC-117 CAPEC-383 CAPEC-477 CAPEC-65