Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Comprehensive Categorization: Protection Mechanism Failure
Category ID:1413
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to protection mechanism failure.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1400Comprehensive Categorization for Software Assurance Trends
HasMemberAllowed-with-ReviewC1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
HasMemberAllowedB1248Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
HasMemberAllowedB1253Incorrect Selection of Fuse Values
HasMemberAllowedB1269Product Released in Non-Release Configuration
HasMemberAllowedB1278Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
HasMemberAllowedB1291Public Key Re-Use for Signing both Debug and Production Code
HasMemberAllowedB1326Missing Immutable Root of Trust in Hardware
HasMemberAllowedB1318Missing Support for Security Features in On-chip Fabrics or Buses
HasMemberAllowedB1319Improper Protection against Electromagnetic Fault Injection (EM-FI)
HasMemberAllowedB1338Improper Protections Against Hardware Overheating
HasMemberAllowedB1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
HasMemberAllowedB182Collapse of Data into Unsafe Value
HasMemberAllowedB184Incomplete List of Disallowed Inputs
HasMemberAllowedB222Truncation of Security-relevant Information
HasMemberAllowedB223Omission of Security-relevant Information
HasMemberAllowedB224Obscured Security-relevant Information by Alternate Name
HasMemberAllowedB450Multiple Interpretations of UI Input
HasMemberAllowedB356Product UI does not Warn User of Unsafe Actions
HasMemberAllowedB357Insufficient UI Warning of Dangerous Operations
HasMemberAllowed-with-ReviewC602Client-Side Enforcement of Server-Side Security
HasMemberAllowedB757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
HasMemberDiscouragedP693Protection Mechanism Failure
HasMemberAllowedB778Insufficient Logging
HasMemberAllowedB807Reliance on Untrusted Inputs in a Security Decision
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1400
Name: Comprehensive Categorization for Software Assurance Trends
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1039
Name: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1248
Name: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1253
Name: Incorrect Selection of Fuse Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1269
Name: Product Released in Non-Release Configuration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1278
Name: Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1291
Name: Public Key Re-Use for Signing both Debug and Production Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1326
Name: Missing Immutable Root of Trust in Hardware
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1318
Name: Missing Support for Security Features in On-chip Fabrics or Buses
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1319
Name: Improper Protection against Electromagnetic Fault Injection (EM-FI)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1338
Name: Improper Protections Against Hardware Overheating
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1429
Name: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 182
Name: Collapse of Data into Unsafe Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 184
Name: Incomplete List of Disallowed Inputs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 222
Name: Truncation of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 223
Name: Omission of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 224
Name: Obscured Security-relevant Information by Alternate Name
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 450
Name: Multiple Interpretations of UI Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 356
Name: Product UI does not Warn User of Unsafe Actions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 357
Name: Insufficient UI Warning of Dangerous Operations
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 602
Name: Client-Side Enforcement of Server-Side Security
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 757
Name: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 693
Name: Protection Mechanism Failure
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 778
Name: Insufficient Logging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 807
Name: Reliance on Untrusted Inputs in a Security Decision
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves [REF-1330].

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-1330
Title: CVE --> CWE Mapping Guidance - Quick Tips
Version: v4.15
Author: MITRE
Publication:
Publisher:
Edition:
URL:https://cwe.mitre.org/documents/cwe_usage/quick_tips.html
URL Date:
Day:25
Month:03
Year:2021
Details not found