Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Verify Message Integrity
Category ID:1020
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to the design and architecture of a system's data integrity components. Frequently these deal with ensuring integrity of data, such as messages, resource files, deployment files, and configuration files. The weaknesses in this category could lead to a degradation of data integrity quality if they are not addressed when designing or implementing a secure architecture.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1008Architectural Concepts
HasMemberAllowedB353Missing Support for Integrity Check
HasMemberAllowedB354Improper Validation of Integrity Check Value
HasMemberAllowedB390Detection of Error Condition Without Action
HasMemberProhibitedB391Unchecked Error Condition
HasMemberAllowedB494Download of Code Without Integrity Check
HasMemberAllowedB565Reliance on Cookies without Validation and Integrity Checking
HasMemberAllowedB649Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
HasMemberDiscouragedP707Improper Neutralization
HasMemberDiscouragedC755Improper Handling of Exceptional Conditions
HasMemberAllowedB924Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1008
Name: Architectural Concepts
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 353
Name: Missing Support for Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 354
Name: Improper Validation of Integrity Check Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 390
Name: Detection of Error Condition Without Action
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 391
Name: Unchecked Error Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 494
Name: Download of Code Without Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 565
Name: Reliance on Cookies without Validation and Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 649
Name: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 707
Name: Improper Neutralization
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 755
Name: Improper Handling of Exceptional Conditions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 924
Name: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-9
Title: A Catalog of Security Architecture Weaknesses.
Version: v4.15
Author: Santos, J. C. S., Tarrit, K., Mirakhorli, M.
Publication:
2017 IEEE International Conference on Software Architecture (ICSA)
Publisher:
Edition:
URL:https://design.se.rit.edu/papers/cawe-paper.pdf
URL Date:
Day:N/A
Month:N/A
Year:2017
Reference ID: REF-10
Title: Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.
Version: v4.15
Author: Santos, J. C. S., Peruma, A., Mirakhorli, M., Galster, M., Sejfia, A.
Publication:
2017 IEEE International Conference on Software Architecture (ICSA)
Publisher:
Edition:
URL:https://design.se.rit.edu/papers/TacticalVulnerabilities.pdf
URL Date:
Day:N/A
Month:N/A
Year:2017
Details not found