CWE

Common Weakness Enumeration

A Community-Developed Dictionary of Software Weakness Types

Common Weakness Scoring System
Common Weakness Risk Analysis Framework
Home > CWE List > CWE- Individual Dictionary Definition (2.8)  

Presentation Filter:

CWE-693: Protection Mechanism Failure

 
Protection Mechanism Failure
Weakness ID: 693 (Weakness Class)Status: Draft
+ Description

Description Summary

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Extended Description

This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path.

+ Time of Introduction
  • Architecture and Design
  • Implementation
  • Operation
+ Applicable Platforms

Languages

All

+ Common Consequences
ScopeEffect
Access Control

Technical Impact: Bypass protection mechanism

+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfCategoryCategory254Security Features
Development Concepts (primary)699
ChildOfCategoryCategory975SFP Secondary Cluster: Architecture
Software Fault Pattern (SFP) Clusters (primary)888
ParentOfWeakness ClassWeakness Class20Improper Input Validation
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base179Incorrect Behavior Order: Early Validation
Research Concepts1000
ParentOfWeakness BaseWeakness Base182Collapse of Data into Unsafe Value
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base183Permissive Whitelist
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base184Incomplete Blacklist
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class284Improper Access Control
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base295Improper Certificate Validation
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base311Missing Encryption of Sensitive Data
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class326Inadequate Encryption Strength
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base327Use of a Broken or Risky Cryptographic Algorithm
Research Concepts (primary)1000
ParentOfWeakness ClassWeakness Class345Insufficient Verification of Data Authenticity
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base357Insufficient UI Warning of Dangerous Operations
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base358Improperly Implemented Security Check for Standard
Research Concepts1000
ParentOfWeakness ClassWeakness Class424Improper Protection of Alternate Path
Research Concepts1000
ParentOfWeakness BaseWeakness Base602Client-Side Enforcement of Server-Side Security
Research Concepts1000
ParentOfWeakness BaseWeakness Base653Insufficient Compartmentalization
Research Concepts1000
ParentOfWeakness BaseWeakness Base654Reliance on a Single Factor in a Security Decision
Research Concepts1000
ParentOfWeakness BaseWeakness Base655Insufficient Psychological Acceptability
Research Concepts1000
ParentOfWeakness BaseWeakness Base656Reliance on Security Through Obscurity
Research Concepts1000
ParentOfWeakness ClassWeakness Class757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base778Insufficient Logging
Research Concepts1000
ParentOfWeakness BaseWeakness Base807Reliance on Untrusted Inputs in a Security Decision
Research Concepts (primary)1000
MemberOfViewView1000Research Concepts
Research Concepts (primary)1000
+ Research Gaps

The concept of protection mechanisms is well established, but protection mechanism failures have not been studied comprehensively. It is suspected that protection mechanisms can have significantly different types of weaknesses than the weaknesses that they are intended to prevent.

+ Maintenance Notes

This is a fairly high-level concept, although it covers a number of weaknesses in CWE that were more scattered throughout the natural hierarchy before Draft 9 was released.

+ Content History
Modifications
Modification DateModifierOrganizationSource
2008-07-01Eric DalciCigitalExternal
updated Time_of_Introduction
2008-09-08CWE Content TeamMITREInternal
updated Description, Relationships, Other_Notes
2009-01-12CWE Content TeamMITREInternal
updated Relationships
2009-03-10CWE Content TeamMITREInternal
updated Related_Attack_Patterns, Relationships
2009-05-27CWE Content TeamMITREInternal
updated Description, Related_Attack_Patterns
2009-07-27CWE Content TeamMITREInternal
updated Relationships
2009-10-29CWE Content TeamMITREInternal
updated Relationships
2010-02-16CWE Content TeamMITREInternal
updated Relationships
2011-03-29CWE Content TeamMITREInternal
updated Maintenance_Notes, Other_Notes, Relationships
2011-06-01CWE Content TeamMITREInternal
updated Common_Consequences
2012-05-11CWE Content TeamMITREInternal
updated Related_Attack_Patterns, Relationships
2013-02-21CWE Content TeamMITREInternal
updated Relationships
2013-07-17CWE Content TeamMITREInternal
updated Relationships
2014-02-18CWE Content TeamMITREInternal
updated Related_Attack_Patterns
2014-07-30CWE Content TeamMITREInternal
updated Relationships
Page Last Updated: July 30, 2014