Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Communication Channel Errors
Category ID:417
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to improper handling of communication channels and access paths. These weaknesses include problems in creating, managing, or removing alternate channels and alternate paths. Some of these can overlap virtual file problems and are commonly used in "bypass" attacks, such as those that exploit authentication errors.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB1327Binding to an Unrestricted IP Address
HasMemberAllowedB322Key Exchange without Entity Authentication
HasMemberAllowed-with-ReviewC346Origin Validation Error
HasMemberAllowedB385Covert Timing Channel
HasMemberAllowedB419Unprotected Primary Channel
HasMemberAllowedB420Unprotected Alternate Channel
HasMemberAllowedB425Direct Request ('Forced Browsing')
HasMemberAllowedB515Covert Storage Channel
HasMemberAllowedB918Server-Side Request Forgery (SSRF)
HasMemberAllowedB924Improper Enforcement of Message Integrity During Transmission in a Communication Channel
HasMemberAllowedB940Improper Verification of Source of a Communication Channel
HasMemberAllowedB941Incorrectly Specified Destination in a Communication Channel
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1327
Name: Binding to an Unrestricted IP Address
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 322
Name: Key Exchange without Entity Authentication
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 346
Name: Origin Validation Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 385
Name: Covert Timing Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 419
Name: Unprotected Primary Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 420
Name: Unprotected Alternate Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 425
Name: Direct Request ('Forced Browsing')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 515
Name: Covert Storage Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 918
Name: Server-Side Request Forgery (SSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 924
Name: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 940
Name: Improper Verification of Source of a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 941
Name: Incorrectly Specified Destination in a Communication Channel
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
Research Gap

Most of these issues are probably under-studied. Only a handful of public reports exist.

N/A

▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
PLOVERCHAP.VIRTFILEN/AChannel and Path Errors
Taxonomy Name: PLOVER
Entry ID: CHAP.VIRTFILE
Fit: N/A
Entry Name: Channel and Path Errors
▼References
Details not found