Category: Audit

Draft
Summary

Weaknesses in this category are related to the design and architecture of audit-based components of the system. Frequently these deal with logging user activities in order to identify attackers and modifications to the system. The weaknesses in this category could lead to a degradation of the quality of the audit capability if they are not addressed when designing or implementing a secure architecture.

Membership
IDNameDescription
CWE-117Improper Output Neutralization for LogsThe product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.
CWE-223Omission of Security-relevant InformationThe product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
CWE-224Obscured Security-relevant Information by Alternate NameThe product records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
CWE-532Insertion of Sensitive Information into Log FileThe product writes sensitive information to a log file.
CWE-778Insufficient LoggingWhen a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.
CWE-779Logging of Excessive DataThe product logs too much information, making log files hard to process and possibly hindering recovery efforts or forensic analysis after an attack.
CWE-1008Architectural ConceptsThis view organizes weaknesses according to common architectural security tactics. It is intended to assist architects in identifying potential mistakes that can be made when designing software.
Vulnerability Mapping Notes
Usage: Prohibited
Reasons: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.
Comment:
See member weaknesses of this category.