Description
A covert channel is a path that can be used to transfer information in a way not intended by the system's designers.
Typically the system has not given authorization for the transmission and has no knowledge of its occurrence.
Potential Impact
Confidentiality, Access Control
Read Application Data, Bypass Protection Mechanism
Demonstrative Examples
def validate_password(actual_pw, typed_pw):
if len(actual_pw) <> len(typed_pw):
return 0
for i in len(actual_pw):
if actual_pw[i] <> typed_pw[i]:
return 0
return 1Detection Methods
- Architecture or Design Review SOAR Partial — According to SOAR [REF-1479], the following detection techniques may be useful:
Related Weaknesses
Taxonomy Mappings
- Landwehr: — Covert Channel
Frequently Asked Questions
What is CWE-514?
CWE-514 (Covert Channel) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Class-level weakness. A covert channel is a path that can be used to transfer information in a way not intended by the system's designers.
How can CWE-514 be exploited?
Attackers can exploit CWE-514 (Covert Channel) to read application data, bypass protection mechanism. This weakness is typically introduced during the Implementation, Operation phase of software development.
How do I prevent CWE-514?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-514?
CWE-514 is classified as a Class-level weakness (High abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.