Common Weakness Enumeration

A Community-Developed List of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors
Home > CWE List > CWE- Individual Dictionary Definition (3.0)  

CWE CATEGORY: Encrypt Data

Category ID: 1013
Status: Draft
+ Summary
Weaknesses in this category are related to the design and architecture of data confidentiality in a system. Frequently these deal with the use of encryption libraries. The weaknesses in this category could lead to a degradation of the quality data encyprtion if they are not addressed when designing or implementing a secure architecture.
+ Membership
MemberOfViewView1008Architectural Concepts
HasMemberVariantVariant256Plaintext Storage of a Password
HasMemberBaseBase257Storing Passwords in a Recoverable Format
HasMemberVariantVariant260Password in Configuration File
HasMemberVariantVariant261Weak Cryptography for Passwords
HasMemberBaseBase311Missing Encryption of Sensitive Data
HasMemberBaseBase312Cleartext Storage of Sensitive Information
HasMemberVariantVariant313Cleartext Storage in a File or on Disk
HasMemberVariantVariant314Cleartext Storage in the Registry
HasMemberVariantVariant315Cleartext Storage of Sensitive Information in a Cookie
HasMemberVariantVariant316Cleartext Storage of Sensitive Information in Memory
HasMemberVariantVariant317Cleartext Storage of Sensitive Information in GUI
HasMemberVariantVariant318Cleartext Storage of Sensitive Information in Executable
HasMemberBaseBase319Cleartext Transmission of Sensitive Information
HasMemberBaseBase321Use of Hard-coded Cryptographic Key
HasMemberBaseBase323Reusing a Nonce, Key Pair in Encryption
HasMemberBaseBase324Use of a Key Past its Expiration Date
HasMemberBaseBase325Missing Required Cryptographic Step
HasMemberClassClass326Inadequate Encryption Strength
HasMemberBaseBase327Use of a Broken or Risky Cryptographic Algorithm
HasMemberBaseBase328Reversible One-Way Hash
HasMemberClassClass330Use of Insufficiently Random Values
HasMemberBaseBase331Insufficient Entropy
HasMemberVariantVariant332Insufficient Entropy in PRNG
HasMemberVariantVariant333Improper Handling of Insufficient Entropy in TRNG
HasMemberBaseBase334Small Space of Random Values
HasMemberBaseBase335Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
HasMemberBaseBase336Same Seed in Pseudo-Random Number Generator (PRNG)
HasMemberBaseBase337Predictable Seed in Pseudo-Random Number Generator (PRNG)
HasMemberBaseBase338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
HasMemberBaseBase339Small Seed Space in PRNG
HasMemberBaseBase347Improper Verification of Cryptographic Signature
HasMemberBaseBase522Insufficiently Protected Credentials
HasMemberVariantVariant523Unprotected Transport of Credentials
HasMemberClassClass757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
HasMemberBaseBase759Use of a One-Way Hash without a Salt
HasMemberBaseBase760Use of a One-Way Hash with a Predictable Salt
HasMemberVariantVariant780Use of RSA Algorithm without OAEP
HasMemberClassClass922Insecure Storage of Sensitive Information
+ References
[REF-9] Santos, J. C. S., Tarrit, K. and Mirakhorli, M.. "A Catalog of Security Architecture Weaknesses.". 2017 IEEE International Conference on Software Architecture (ICSA). 2017. <>.
[REF-10] Santos, J. C. S., Peruma, A., Mirakhorli, M., Galster, M. and Sejfia, A.. "Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.". pages 69 - 78. 2017 IEEE International Conference on Software Architecture (ICSA). 2017. <>.
+ Content History
Modification DateModifierOrganization
2017-07-25CWE Content TeamMITRE
New Entry

More information is available — Please select a different filter.
Page Last Updated: January 18, 2018