Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1357:Reliance on Insufficiently Trustworthy Component
Weakness ID:1357
Version:v4.17
Weakness Name:Reliance on Insufficiently Trustworthy Component
Vulnerability Mapping:Allowed-with-Review
Abstraction:Class
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product is built from multiple separate components, but it uses a component that is not sufficiently trusted to meet expectations for security, reliability, updateability, and maintainability.

▼Extended Description

Many modern hardware and software products are built by combining multiple smaller components together into one larger entity, often during the design or architecture phase. For example, a hardware component might be built by a separate supplier, or the product might use an open-source software library from a third party.

Regardless of the source, each component should be sufficiently trusted to ensure correct, secure operation of the product. If a component is not trustworthy, it can produce significant risks for the overall product, such as vulnerabilities that cannot be patched fast enough (if at all); hidden functionality such as malware; inability to update or replace the component if needed for security purposes; hardware components built from parts that do not meet specifications in ways that can lead to weaknesses; etc. Note that a component might not be trustworthy even if it is owned by the product vendor, such as a software component whose source code is lost and was built by developers who left the company, or a component that was developed by a separate company that was acquired and brought into the product's own company.

Note that there can be disagreement as to whether a component is sufficiently trustworthy, since trust is ultimately subjective. Different stakeholders (e.g., customers, vendors, governments) have various threat models and ways to assess trust, and design/architecture choices might make tradeoffs between security, reliability, safety, privacy, cost, and other characteristics.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfDiscouragedP710Improper Adherence to Coding Standards
ParentOfAllowedB1104Use of Unmaintained Third Party Components
ParentOfAllowedB1329Reliance on Component That is Not Updateable
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 710
Name: Improper Adherence to Coding Standards
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1104
Name: Use of Unmaintained Third Party Components
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1329
Name: Reliance on Component That is Not Updateable
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC1208Cross-Cutting Problems
MemberOfProhibitedC1367ICS Dependencies (& Architecture): External Physical Systems
MemberOfProhibitedC1368ICS Dependencies (& Architecture): External Digital Systems
MemberOfProhibitedC1370ICS Supply Chain: Common Mode Frailties
MemberOfProhibitedC1412Comprehensive Categorization: Poor Coding Practices
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1208
Name: Cross-Cutting Problems
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1367
Name: ICS Dependencies (& Architecture): External Physical Systems
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1368
Name: ICS Dependencies (& Architecture): External Digital Systems
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1370
Name: ICS Supply Chain: Common Mode Frailties
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1412
Name: Comprehensive Categorization: Poor Coding Practices
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-301Not Architecture-Specific (architecture class) Weaknesses
MemberOfProhibitedBSBOSS-305ICS/OT (technology class) Weaknesses
MemberOfProhibitedBSBOSS-307Not Technology-Specific (technology class) Weaknesses
MemberOfProhibitedBSBOSS-310Reduce Maintainability (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-301
Name: Not Architecture-Specific (architecture class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-305
Name: ICS/OT (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-307
Name: Not Technology-Specific (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-310
Name: Reduce Maintainability (impact)
▼Relevant To View
Relevant to the view"Hardware Design - (1194)"
NatureMappingTypeIDName
MemberOfProhibitedC1208Cross-Cutting Problems
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1208
Name: Cross-Cutting Problems
Relevant to the view"SEI ETF Categories of Security Vulnerabilities in ICS - (1358)"
NatureMappingTypeIDName
MemberOfProhibitedC1367ICS Dependencies (& Architecture): External Physical Systems
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1367
Name: ICS Dependencies (& Architecture): External Physical Systems
Relevant to the view"SEI ETF Categories of Security Vulnerabilities in ICS - (1358)"
NatureMappingTypeIDName
MemberOfProhibitedC1368ICS Dependencies (& Architecture): External Digital Systems
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1368
Name: ICS Dependencies (& Architecture): External Digital Systems
Relevant to the view"SEI ETF Categories of Security Vulnerabilities in ICS - (1358)"
NatureMappingTypeIDName
MemberOfProhibitedC1370ICS Supply Chain: Common Mode Frailties
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1370
Name: ICS Supply Chain: Common Mode Frailties
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
OtherN/AReduce Maintainability
N/A
Scope: Other
Likelihood: N/A
Impact: Reduce Maintainability
Note:
N/A
▼Potential Mitigations
Phase:Requirements, Architecture and Design, Implementation
Mitigation ID:
Strategy:
Effectiveness:
Description:

For each component, ensure that its supply chain is well-controlled with sub-tier suppliers using best practices. For third-party software components such as libraries, ensure that they are developed and actively maintained by reputable vendors.

Note:


Phase:Architecture and Design, Implementation, Integration, Manufacturing
Mitigation ID:
Strategy:
Effectiveness:
Description:

Maintain a Bill of Materials for all components and sub-components of the product. For software, maintain a Software Bill of Materials (SBOM). According to [REF-1247], "An SBOM is a formal, machine-readable inventory of software components and dependencies, information about those components, and their hierarchical relationships."

Note:


Phase:Operation, Patching and Maintenance
Mitigation ID:
Strategy:
Effectiveness:
Description:

Continue to monitor changes in each of the product's components, especially when the changes indicate new vulnerabilities, end-of-life (EOL) plans, supplier practices that affect trustworthiness, etc.

Note:

▼Modes Of Introduction
Phase: Requirements
Note:

Requirements might include criteria for which the only available solutions are provided by insufficiently trusted components.

Phase: Architecture and Design
Note:

An insufficiently trusted component might be selected because it is less expensive to do in-house, requires expertise that is not available in-house, or might allow the product to reach the market faster.

▼Applicable Platforms
Technology
Class: Not Technology-Specific(Undetermined Prevalence)
Class: ICS/OT(Undetermined Prevalence)
Architecture
Class: Not Architecture-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2020-9054
Chain: network-attached storage (NAS) device has a critical OS command injection (CWE-78) vulnerability that is actively exploited to place IoT devices into a botnet, but some products are "end-of-support" and cannot be patched (CWE-1277). [REF-1097]
Reference: CVE-2020-9054
Description:
Chain: network-attached storage (NAS) device has a critical OS command injection (CWE-78) vulnerability that is actively exploited to place IoT devices into a botnet, but some products are "end-of-support" and cannot be patched (CWE-1277). [REF-1097]
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Indirect
      N/A
      Ordinality: Indirect
      Description:
      N/A
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed-with-Review
      Reason:Abstraction
      Rationale:

      This CWE entry is a Class and might have Base-level children that would be more appropriate

      Comments:

      Examine children of this entry to see if there is a better fit

      Suggestions:
      ▼Notes
      Maintenance

      As of CWE 4.10, the name and description for this entry has undergone significant change and is still under public discussion, especially by members of the HW SIG.

      N/A

      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ISA/IEC 62443Part 2-4N/AReq SP.03.02 RE(1)
      ISA/IEC 62443Part 2-4N/AReq SP.03.02 RE(2)
      ISA/IEC 62443Part 3-3N/AReq SR 1.13
      ISA/IEC 62443Part 4-2N/AReq EDR 3.12
      ISA/IEC 62443Part 4-2N/AReq HDR 3.12
      ISA/IEC 62443Part 4-2N/AReq NDR 3.12
      ISA/IEC 62443Part 4-2N/AReq EDR 3.13
      ISA/IEC 62443Part 4-2N/AReq HDR 3.13
      ISA/IEC 62443Part 4-2N/AReq NDR 3.13
      ISA/IEC 62443Part 4-2N/AReq CR-7.8
      ISA/IEC 62443Part 4-1N/AReq SM-6
      ISA/IEC 62443Part 4-1N/AReq SM-9
      ISA/IEC 62443Part 4-1N/AReq SM-10
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 2-4
      Fit: N/A
      Entry Name: Req SP.03.02 RE(1)
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 2-4
      Fit: N/A
      Entry Name: Req SP.03.02 RE(2)
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 3-3
      Fit: N/A
      Entry Name: Req SR 1.13
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req EDR 3.12
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req HDR 3.12
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req NDR 3.12
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req EDR 3.13
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req HDR 3.13
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req NDR 3.13
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-2
      Fit: N/A
      Entry Name: Req CR-7.8
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-1
      Fit: N/A
      Entry Name: Req SM-6
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-1
      Fit: N/A
      Entry Name: Req SM-9
      Taxonomy Name: ISA/IEC 62443
      Entry ID: Part 4-1
      Fit: N/A
      Entry Name: Req SM-10
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-1212
      Title: A06:2021 - Vulnerable and Outdated Components
      Author:
      Section:
      Publication:
      Publisher:OWASP
      Edition:
      URL:https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/
      URL Date:
      Day:24
      Month:09
      Year:2021
      Reference ID: REF-1246
      Title: SOFTWARE BILL OF MATERIALS
      Author: National Telecommunications and Information Administration
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://ntia.gov/page/software-bill-materials
      URL Date:2023-04-07
      Day:N/A
      Month:N/A
      Year:N/A
      Reference ID: REF-1247
      Title: Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM)
      Author: NTIA Multistakeholder Process on Software Component Transparency Framing Working Group
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://www.ntia.gov/files/ntia/publications/ntia_sbom_framing_2nd_edition_20211021.pdf
      URL Date:
      Day:21
      Month:10
      Year:2021
      Reference ID: REF-1097
      Title: Zyxel Flaw Powers New Mirai IoT Botnet Strain
      Author: Brian Krebs
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://krebsonsecurity.com/2020/03/zxyel-flaw-powers-new-mirai-iot-botnet-strain/
      URL Date:
      Day:20
      Month:03
      Year:2020
      Details not found