Description
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Potential Impact
Integrity, Other
Varies by Context, Unexpected State
Demonstrative Examples
Detection Methods
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2022-30260 | Distributed Control System (DCS) does not sign firmware images and only relies on insecure checksums for integrity checks |
| CVE-2022-30267 | Distributed Control System (DCS) does not sign firmware images and only relies on insecure checksums for integrity checks |
| CVE-2022-30272 | Remote Terminal Unit (RTU) does not use signatures for firmware images and relies on insecure checksums |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Insufficient Verification of Data
- OWASP Top Ten 2004: A3 — Broken Authentication and Session Management
- WASC: 12 — Content Spoofing
Frequently Asked Questions
What is CWE-345?
CWE-345 (Insufficient Verification of Data Authenticity) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Class-level weakness. The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
How can CWE-345 be exploited?
Attackers can exploit CWE-345 (Insufficient Verification of Data Authenticity) to varies by context, unexpected state. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-345?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-345?
CWE-345 is classified as a Class-level weakness (High abstraction). It has been observed in 3 real-world CVEs.