Description
When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.
When security-critical events are not logged properly, such as a failed login attempt, this can make malicious behavior more difficult to detect and may hinder forensic analysis after an attack succeeds. As organizations adopt cloud storage resources, these technologies often require configuration changes to enable detailed logging information, since detailed logging can incur additional costs. This could lead to telemetry gaps in critical audit logs. For example, in Azure, the default value for logging is disabled.
Potential Impact
Non-Repudiation
Hide Activities
Demonstrative Examples
<system.serviceModel><behaviors><serviceBehaviors><behavior name="NewBehavior"><serviceSecurityAudit auditLogLocation="Default"suppressAuditFailure="false"serviceAuthorizationAuditLevel="None"messageAuthenticationAuditLevel="None" />...
</system.serviceModel><system.serviceModel><behaviors><serviceBehaviors><behavior name="NewBehavior"><serviceSecurityAudit auditLogLocation="Default"suppressAuditFailure="false"serviceAuthorizationAuditLevel="SuccessAndFailure"messageAuthenticationAuditLevel="SuccessAndFailure" />
...
</system.serviceModel>if LoginUser(){
// Login successful
RunProgram();
} else {
// Login unsuccessful
LoginRetry();
}if LoginUser(){
// Login successful
log.warn("Login by user successful.");
RunProgram();
} else {
// Login unsuccessful
log.warn("Login attempt by user failed, trying again.");
LoginRetry();
}az storage logging update --account-name --account-key --services b --log d --retention 90az storage logging update --account-name --account-key --services b --log rwd --retention 90Set-AzStorageServiceLoggingProperty -ServiceType Queue -LoggingOperations read,write,delete -RetentionDays 5 -Context $MyContextObjectMitigations & Prevention
Use a centralized logging mechanism that supports multiple levels of detail.
Ensure that all security-related successes and failures can be logged. When storing data in the cloud (e.g., AWS S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to enable and capture detailed logging information.
Be sure to set the level of logging appropriately in a production environment. Sufficient data should be logged to enable system administrators to detect attacks, diagnose errors, and recover from attacks. At the same time, logging too much data (CWE-779) can cause the same problems, including unexpected costs when using a cloud environment.
To enable storage logging using Azure's Portal, navigate to the name of the Storage Account, locate Monitoring (CLASSIC) section, and select Diagnostic settings (classic). For each of the various properties (blob, file, table, queue), ensure the status is properly set for the desired logging data. If using PowerShell, the Set-AzStorageServiceLoggingProperty command could be called using appropriate -ServiceType, -LoggingOperations, and -RetentionDays arguments.
Detection Methods
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2008-4315 | server does not log failed authentication attempts, making it easier for attackers to perform brute force password guessing without being detected |
| CVE-2008-1203 | admin interface does not log failed authentication attempts, making it easier for attackers to perform brute force password guessing without being detected |
| CVE-2007-3730 | default configuration for POP server does not log source IP or username for login attempts |
| CVE-2007-1225 | proxy does not log requests without "http://" in the URL, allowing web surfers to access restricted web content without detection |
| CVE-2003-1566 | web server does not log requests for a non-standard request type |
Related Weaknesses
Frequently Asked Questions
What is CWE-778?
CWE-778 (Insufficient Logging) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.
How can CWE-778 be exploited?
Attackers can exploit CWE-778 (Insufficient Logging) to hide activities. This weakness is typically introduced during the Operation phase of software development.
How do I prevent CWE-778?
Key mitigations include: Use a centralized logging mechanism that supports multiple levels of detail.
What is the severity of CWE-778?
CWE-778 is classified as a Base-level weakness (Medium abstraction). It has been observed in 5 real-world CVEs.