Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Credentials Management Errors
Category ID:255
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to the management of credentials.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB1392Use of Default Credentials
HasMemberAllowedB256Plaintext Storage of a Password
HasMemberAllowedB257Storing Passwords in a Recoverable Format
HasMemberAllowedB260Password in Configuration File
HasMemberAllowedB261Weak Encoding for Password
HasMemberAllowedB262Not Using Password Aging
HasMemberAllowedB263Password Aging with Long Expiration
HasMemberAllowedB324Use of a Key Past its Expiration Date
HasMemberAllowedB521Weak Password Requirements
HasMemberAllowedB523Unprotected Transport of Credentials
HasMemberAllowedB549Missing Password Field Masking
HasMemberAllowedB620Unverified Password Change
HasMemberAllowed-with-ReviewB640Weak Password Recovery Mechanism for Forgotten Password
HasMemberAllowedB798Use of Hard-coded Credentials
HasMemberAllowedB916Use of Password Hash With Insufficient Computational Effort
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1392
Name: Use of Default Credentials
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 256
Name: Plaintext Storage of a Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 257
Name: Storing Passwords in a Recoverable Format
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 260
Name: Password in Configuration File
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 261
Name: Weak Encoding for Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 262
Name: Not Using Password Aging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 263
Name: Password Aging with Long Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 324
Name: Use of a Key Past its Expiration Date
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 521
Name: Weak Password Requirements
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 523
Name: Unprotected Transport of Credentials
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 549
Name: Missing Password Field Masking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 620
Name: Unverified Password Change
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 640
Name: Weak Password Recovery Mechanism for Forgotten Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 798
Name: Use of Hard-coded Credentials
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 916
Name: Use of Password Hash With Insufficient Computational Effort
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves [REF-1287]. This CWE ID may have become widely-used because of NIST's usage in NVD from 2008 to 2016 (see CWE-635 view, updated to the CWE-1003 view in 2016).

Comments:

Some weakness-oriented alternatives might be found under Improper Authentication (CWE-287) or keyword searches for credentials.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
OWASP Top Ten 2004A3CWE More SpecificBroken Authentication and Session Management
Taxonomy Name: OWASP Top Ten 2004
Entry ID: A3
Fit: CWE More Specific
Entry Name: Broken Authentication and Session Management
▼References
Reference ID: REF-1287
Title: Supplemental Details - 2022 CWE Top 25
Version: v4.15
Author: MITRE
Publication:
Publisher:
Edition:
URL:https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#problematicMappingDetails
URL Date:
Day:28
Month:06
Year:2022
Details not found