Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Security Primitives and Cryptography Issues
Category ID:1205
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to hardware implementations of cryptographic protocols and other hardware-security primitives such as physical unclonable functions (PUFs) and random number generators (RNGs).

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1194Hardware Design
HasMemberAllowedB1240Use of a Cryptographic Primitive with a Risky Implementation
HasMemberAllowedB1241Use of Predictable Algorithm in Random Number Generator
HasMemberAllowedB1279Cryptographic Operations are run Before Supporting Units are Ready
HasMemberAllowedB1351Improper Handling of Hardware Behavior in Exceptionally Cold Environments
HasMemberAllowedB1431Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
HasMemberAllowedB203Observable Discrepancy
HasMemberAllowedB325Missing Cryptographic Step
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1194
Name: Hardware Design
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1240
Name: Use of a Cryptographic Primitive with a Risky Implementation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1241
Name: Use of Predictable Algorithm in Random Number Generator
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1279
Name: Cryptographic Operations are run Before Supporting Units are Ready
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1351
Name: Improper Handling of Hardware Behavior in Exceptionally Cold Environments
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1431
Name: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 203
Name: Observable Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 325
Name: Missing Cryptographic Step
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found