CWE-325: Missing Cryptographic Step
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
常见后果
影响范围: Access Control
技术影响: Bypass Protection Mechanism
影响范围: Confidentiality Integrity
技术影响: Read Application Data Modify Application Data
影响范围: Accountability Non-Repudiation
技术影响: Hide Activities
观察示例
参考: CVE-2001-1585
Missing challenge-response step allows authentication bypass using public key.
引入模式
| 阶段 | 说明 |
|---|---|
| Implementation | Developers sometimes omit "expensive" (resource-intensive) steps in order to improve performance, especially in devices with limited memory or slower CPUs. This step may be taken under a mistaken impression that the step is unnecessary for the cryptographic algorithm. |
| Requirements | This issue may happen when the requirements for the cryptographic algorithm are not clearly stated. |
适用平台
编程语言
技术
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Missing Required Cryptographic Step | - |
| OWASP Top Ten 2007 | A8 | Insecure Cryptographic Storage | CWE More Specific |
| OWASP Top Ten 2007 | A9 | Insecure Communications | CWE More Specific |