Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1240:Use of a Cryptographic Primitive with a Risky Implementation
Weakness ID:1240
Version:v4.17
Weakness Name:Use of a Cryptographic Primitive with a Risky Implementation
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Submissions
Submission DateRelease DateSubmitterOrganizationVersionComment
2020-02-102020-02-24Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V MangipudiIntel Corporation4.0

N/A

Submission Date: 2020-02-10

Release Date: 2020-02-24

Submitter: Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi

Organization: Intel Corporation

Version: 4.0

Comment:

N/A

▼Modifications
Modification DateRelease DateModifierOrganizationVersionImportanceComment
2020-08-20N/ACWE Content TeamMITREN/AN/A

updated Background_Details, Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns, Research_Gaps

2021-07-20N/ACWE Content TeamMITREN/AN/A

updated Maintenance_Notes, Research_Gaps

2021-10-28N/ACWE Content TeamMITREN/AN/A

updated Background_Details, Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, References, Relationships, Terminology_Notes, Weakness_Ordinalities

2023-04-27N/ACWE Content TeamMITREN/AN/A

updated References, Relationships

2023-06-29N/ACWE Content TeamMITREN/AN/A

updated Mapping_Notes

2025-04-032025-04-03CWE Content TeamMITRE4.17N/A

updated Demonstrative_Examples

Modification Date: 2020-08-20

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Background_Details, Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns, Research_Gaps

Modification Date: 2021-07-20

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Maintenance_Notes, Research_Gaps

Modification Date: 2021-10-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Background_Details, Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, References, Relationships, Terminology_Notes, Weakness_Ordinalities

Modification Date: 2023-04-27

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated References, Relationships

Modification Date: 2023-06-29

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Mapping_Notes

Modification Date: 2025-04-03

Release Date: 2025-04-03

Modifier: CWE Content Team

Organization: MITRE

Version: 4.17

Importance: N/A

Comment:

updated Demonstrative_Examples

▼Contributions
Contributor DateRelease DateTypeContributorOrganizationVersionComment
2021-10-18N/AContentParbati K. MannaIntel CorporationN/A

provided detection methods and observed examples

Contributor Date: 2021-10-18

Release Date: N/A

Type: Content

Contributor: Parbati K. Manna

Organization: Intel Corporation

Version: N/A

Comment:

provided detection methods and observed examples

▼Previous Name Entries
Change DatePrevious Entry NameVersion
2021-10-28

Use of a Risky Cryptographic Primitive

N/A

Change Date: 2021-10-28

Version: N/A

Previous Entry Name: Use of a Risky Cryptographic Primitive