CWE-347: Improper Verification of Cryptographic Signature

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

常见后果

影响范围: Access Control Integrity Confidentiality

技术影响: Gain Privileges or Assume Identity Modify Application Data Execute Unauthorized Code or Commands

说明: An attacker could gain access to sensitive data and possibly execute unauthorized code.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2002-1796

Does not properly verify signatures for "trusted" entities.

参考: CVE-2005-2181

Insufficient verification allows spoofing.

参考: CVE-2005-2182

Insufficient verification allows spoofing.

参考: CVE-2002-1706

Accepts a configuration file without a Message Integrity Check (MIC) signature.

引入模式

阶段 说明
Architecture and Design -
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Improperly Verified Signature -
The CERT Oracle Secure Coding Standard for Java (2011) SEC06-J Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar -
ISA/IEC 62443 Part 3-3 Req SR 1.9 -
ISA/IEC 62443 Part 4-1 Req SM-6 -
ISA/IEC 62443 Part 4-2 Req EDR 3.12 -
ISA/IEC 62443 Part 4-2 Req NDR 3.12 -
ISA/IEC 62443 Part 4-2 Req HDR 3.12 -
关键信息

CWE ID: CWE-347

抽象级别: Base

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-463 CAPEC-475