CWE

Common Weakness Enumeration

A Community-Developed Dictionary of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors Common Weakness Scoring System
Common Weakness Risk Analysis Framework
Home > CWE List > CWE- Individual Dictionary Definition (2.7)  

Presentation Filter:

CWE-693: Protection Mechanism Failure

 
Protection Mechanism Failure
Weakness ID: 693 (Weakness Class)Status: Draft
+ Description

Description Summary

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Extended Description

This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path.

+ Time of Introduction
  • Architecture and Design
  • Implementation
  • Operation
+ Applicable Platforms

Languages

All

+ Common Consequences
ScopeEffect

Technical Impact: Bypass protection mechanism

+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfCategoryCategory254Security Features
Development Concepts (primary)699
ChildOfCategoryCategory907SFP Cluster: Other
Software Fault Pattern (SFP) Clusters (primary)888
ParentOfWeakness ClassWeakness Class20Improper Input Validation
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base179Incorrect Behavior Order: Early Validation
Research Concepts1000
ParentOfWeakness BaseWeakness Base182Collapse of Data into Unsafe Value
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base183Permissive Whitelist
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base184Incomplete Blacklist
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class284Improper Access Control
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base295Improper Certificate Validation
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base311Missing Encryption of Sensitive Data
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class326Inadequate Encryption Strength
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base327Use of a Broken or Risky Cryptographic Algorithm
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class345Insufficient Verification of Data Authenticity
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base357Insufficient UI Warning of Dangerous Operations
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base358Improperly Implemented Security Check for Standard
Research Concepts1000
ParentOfWeakness ClassWeakness Class424Improper Protection of Alternate Path
Research Concepts1000
ParentOfWeakness BaseWeakness Base602Client-Side Enforcement of Server-Side Security
Research Concepts1000
ParentOfWeakness BaseWeakness Base653Insufficient Compartmentalization
Research Concepts1000
ParentOfWeakness BaseWeakness Base654Reliance on a Single Factor in a Security Decision
Research Concepts1000
ParentOfWeakness BaseWeakness Base655Insufficient Psychological Acceptability
Research Concepts1000
ParentOfWeakness BaseWeakness Base656Reliance on Security Through Obscurity
Research Concepts1000
ParentOfWeakness ClassWeakness Class757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base778Insufficient Logging
Research Concepts1000
ParentOfWeakness BaseWeakness Base807Reliance on Untrusted Inputs in a Security Decision
Research Concepts (primary)1000
MemberOfViewView1000Research Concepts
Research Concepts (primary)1000
+ Research Gaps

The concept of protection mechanisms is well established, but protection mechanism failures have not been studied comprehensively. It is suspected that protection mechanisms can have significantly different types of weaknesses than the weaknesses that they are intended to prevent.

+ Maintenance Notes

This is a fairly high-level concept, although it covers a number of weaknesses in CWE that were more scattered throughout the natural hierarchy before Draft 9 was released.

+ Content History
Modifications
Modification DateModifierOrganizationSource
2008-07-01CigitalExternal
updated Time_of_Introduction
2008-09-08MITREInternal
updated Description, Relationships, Other_Notes
2009-01-12MITREInternal
updated Relationships
2009-03-10MITREInternal
updated Related_Attack_Patterns, Relationships
2009-05-27MITREInternal
updated Description, Related_Attack_Patterns
2009-07-27MITREInternal
updated Relationships
2009-10-29MITREInternal
updated Relationships
2010-02-16MITREInternal
updated Relationships
2011-03-29MITREInternal
updated Maintenance_Notes, Other_Notes, Relationships
2011-06-01MITREInternal
updated Common_Consequences
2012-05-11MITREInternal
updated Related_Attack_Patterns, Relationships
2013-02-21MITREInternal
updated Relationships
2013-07-17MITREInternal
updated Relationships
2014-02-18MITREInternal
updated Related_Attack_Patterns
Page Last Updated: June 23, 2014