Category: Comprehensive Categorization: Protection Mechanism Failure

Incomplete
Summary

Weaknesses in this category are related to protection mechanism failure.

Membership
IDNameDescription
CWE-1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition MechanismThe product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) as a particular concept or category, but it does not properly detect or handle inputs that have been modified or constructed in a way that causes the mechanism to detect a different, incorrect concept.
CWE-1248Semiconductor Defects in Hardware Logic with Security-Sensitive ImplicationsThe security-sensitive hardware module contains semiconductor defects.
CWE-1253Incorrect Selection of Fuse ValuesThe logic level used to set a system to a secure state relies on a fuse being unblown. An attacker can set the system to an insecure state merely by blowing the fuse.
CWE-1269Product Released in Non-Release ConfigurationThe product released to market is released in pre-production or manufacturing configuration.
CWE-1278Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging TechniquesInformation stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the integrated circuit using techniques such as scanning electron microscopy.
CWE-1291Public Key Re-Use for Signing both Debug and Production CodeThe same public key is used for signing both debug and production code.
CWE-1318Missing Support for Security Features in On-chip Fabrics or BusesOn-chip fabrics or buses either do not support or are not configured to support privilege separation or other security features, such as access control.
CWE-1319Improper Protection against Electromagnetic Fault Injection (EM-FI)The device is susceptible to electromagnetic fault injection attacks, causing device internal information to be compromised or security mechanisms to be bypassed.
CWE-1326Missing Immutable Root of Trust in HardwareA missing immutable root of trust in the hardware results in the ability to bypass secure boot or execute untrusted or adversarial boot code.
CWE-1338Improper Protections Against Hardware OverheatingA hardware device is missing or has inadequate protection features to prevent overheating.
CWE-1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware InterfaceThe product has a hardware interface that silently discards operations in situations for which feedback would be security-relevant, such as the timely detection of failures or attacks.
CWE-182Collapse of Data into Unsafe ValueThe product filters data in a way that causes it to be reduced or "collapsed" into an unsafe value that violates an expected security property.
CWE-184Incomplete List of Disallowed InputsThe product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.
CWE-222Truncation of Security-relevant InformationThe product truncates the display, recording, or processing of security-relevant information in a way that can obscure the source or nature of an attack.
CWE-223Omission of Security-relevant InformationThe product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
CWE-224Obscured Security-relevant Information by Alternate NameThe product records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
CWE-356Product UI does not Warn User of Unsafe ActionsThe product's user interface does not warn the user before undertaking an unsafe action on behalf of that user. This makes it easier for attackers to trick users into inflicting damage to their system.
CWE-357Insufficient UI Warning of Dangerous OperationsThe user interface provides a warning to a user regarding dangerous or sensitive operations, but the warning is not noticeable enough to warrant attention.
CWE-450Multiple Interpretations of UI InputThe UI has multiple interpretations of user input but does not prompt the user when it selects the less secure interpretation.
CWE-602Client-Side Enforcement of Server-Side SecurityThe product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
CWE-693Protection Mechanism FailureThe product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
CWE-757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
CWE-778Insufficient LoggingWhen a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.
CWE-807Reliance on Untrusted Inputs in a Security DecisionThe product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
CWE-1400Comprehensive Categorization for Software Assurance Trends
Vulnerability Mapping Notes
Usage: Prohibited
Reasons: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves [REF-1330].
Comment:
See member weaknesses of this category.