Skip to content

Latest commit

 

History

History
39 lines (32 loc) · 1.39 KB

cwe-software-supplu-chain.md

File metadata and controls

39 lines (32 loc) · 1.39 KB
title
Software suply chain CWEs

What are the CWEs from the Common Weakness Enumeration related to software supply chain issues?

  1. Dependency Management:
  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere
  • CWE-494: Download of Code Without Integrity Check
  • CWE-1021: Improper Restriction of Rendered UI Layers or Frames
  • CWE-937: Using Components with Known Vulnerabilities
  • CWE-1104: Use of Unmaintained Third Party Components
  • CWE-940: Improper Verification of Source of a Communication Channel
  1. Build Process:
  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes
  • CWE-506: Embedded Malicious Code
  • CWE-912: Hidden Functionality
  1. Crypto and Secrets
  • CWE-347: Improper Verification of Cryptographic Signature
  • CWE-354: Improper Validation of Integrity Check Value
  • CWE-798: Use of Hard-coded Credentials
  • CWE-311: Missing Encryption of Sensitive Data
  • CWE-326: Inadequate Encryption Strength
  1. Update Mechanisms:
  • CWE-441: Unintended Proxy or Intermediary
  • CWE-494: Download of Code Without Integrity Check
  • CWE-799: Improper Control of Interaction Frequency
  1. Repository Security:
  • CWE-284: Improper Access Control
  • CWE-287: Improper Authentication
  • CWE-522: Insufficiently Protected Credentials
  1. Configuration Management:
  • CWE-16: Configuration
  • CWE-520: .NET Misconfiguration: Use of Impersonation