CWE-347: Improper Verification of Cryptographic Signature

Export to Word

Description

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Extended Description

N/A


ThreatScore

Threat Mapped score: 0.0

Industry: Finiancial

Threat priority: Unclassified


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)


Attack TTPs

N/A

Modes of Introduction

Phase Note
Architecture and Design N/A
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: In the following code, a JarFile object is created from a downloaded file.

Body: The JAR file that was potentially downloaded from an untrusted source is created without verifying the signature (if present). An alternate constructor that accepts a boolean verify parameter should be used instead.

File f = new File(downloadedFilePath); JarFile jf = new JarFile(f);

Notes

← Back to CWE list