CWE-345: Insufficient Verification of Data Authenticity

Class Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

常见后果

影响范围: Integrity Other

技术影响: Varies by Context Unexpected State

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2022-30260

Distributed Control System (DCS) does not sign firmware images and only relies on insecure checksums for integrity checks

参考: CVE-2022-30267

Distributed Control System (DCS) does not sign firmware images and only relies on insecure checksums for integrity checks

参考: CVE-2022-30272

Remote Terminal Unit (RTU) does not use signatures for firmware images and relies on insecure checksums

引入模式

阶段 说明
Architecture and Design -
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
ICS/OT (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Insufficient Verification of Data -
OWASP Top Ten 2004 A3 Broken Authentication and Session Management CWE More Specific
WASC 12 Content Spoofing -
关键信息

CWE ID: CWE-345

抽象级别: Class

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-111 CAPEC-141 CAPEC-142 CAPEC-148 CAPEC-218 CAPEC-384 CAPEC-385 CAPEC-386 CAPEC-387 CAPEC-388 CAPEC-665 CAPEC-701