[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Use of Invariant Value in Dynamically Changing Context

ID: 344Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The product uses a constant value, name, or reference, but this value can (or should) vary across different environments.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Other
 
Varies by context
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
  Increase the entropy used to seed a PRNG.
 
  
Architecture and Design
Requirements
 
Libraries or Frameworks
 
Use products or modules that conform to FIPS 140-2 [R.344.1] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
 
  

Relationships
overlaps default configuration.

Related CWETypeViewChain
CWE-344 ChildOf CWE-905 Category CWE-888  

Demonstrative Examples
None

Observed Examples

  1. CVE-2002-0980 : Component for web browser writes an error message to a known location, which can then be referenced by attackers to process HTML/script in a less restrictive context

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Static Value in Unpredictable Context
 
 

References:

  1. Information Technology Laboratory, National Institute of Standards and Technology .SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES. 2001-05-25.

© SecPod Technologies