Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1104:Use of Unmaintained Third Party Components
Weakness ID:1104
Version:v4.17
Weakness Name:Use of Unmaintained Third Party Components
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product relies on third-party components that are not actively supported or maintained by the original developer or a trusted proxy for the original developer.

▼Extended Description

Reliance on components that are no longer maintained can make it difficult or impossible to fix significant bugs, vulnerabilities, or quality issues. In effect, unmaintained code can become obsolete.

This issue makes it more difficult to maintain the product, which indirectly affects security by making it more difficult or time-consuming to find and/or fix vulnerabilities. It also might make it easier to introduce vulnerabilities.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC1357Reliance on Insufficiently Trustworthy Component
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 1357
Name: Reliance on Insufficiently Trustworthy Component
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC1006Bad Coding Practices
MemberOfProhibitedC1352OWASP Top Ten 2021 Category A06:2021 - Vulnerable and Outdated Components
MemberOfProhibitedC1368ICS Dependencies (& Architecture): External Digital Systems
MemberOfProhibitedC1415Comprehensive Categorization: Resource Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1006
Name: Bad Coding Practices
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1352
Name: OWASP Top Ten 2021 Category A06:2021 - Vulnerable and Outdated Components
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1368
Name: ICS Dependencies (& Architecture): External Digital Systems
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1415
Name: Comprehensive Categorization: Resource Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-305ICS/OT (technology class) Weaknesses
MemberOfProhibitedBSBOSS-307Not Technology-Specific (technology class) Weaknesses
MemberOfProhibitedBSBOSS-310Reduce Maintainability (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-305
Name: ICS/OT (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-307
Name: Not Technology-Specific (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-310
Name: Reduce Maintainability (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC1006Bad Coding Practices
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1006
Name: Bad Coding Practices
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1352OWASP Top Ten 2021 Category A06:2021 - Vulnerable and Outdated Components
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1352
Name: OWASP Top Ten 2021 Category A06:2021 - Vulnerable and Outdated Components
Relevant to the view"SEI ETF Categories of Security Vulnerabilities in ICS - (1358)"
NatureMappingTypeIDName
MemberOfProhibitedC1368ICS Dependencies (& Architecture): External Digital Systems
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1368
Name: ICS Dependencies (& Architecture): External Digital Systems
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
OtherN/AReduce Maintainability
N/A
Scope: Other
Likelihood: N/A
Impact: Reduce Maintainability
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
▼Applicable Platforms
Technology
Class: Not Technology-Specific(Undetermined Prevalence)
Class: ICS/OT(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Indirect
      N/A
      Ordinality: Indirect
      Description:
      N/A
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-1212
      Title: A06:2021 - Vulnerable and Outdated Components
      Author:
      Section:
      Publication:
      Publisher:OWASP
      Edition:
      URL:https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/
      URL Date:
      Day:24
      Month:09
      Year:2021
      Details not found