무기체계와 컴퓨터/컴퓨터와 무기체계 소프트웨어

무기체계 SW CWE 점검 목록

xdots 2023. 10. 22. 08:07

굵은 글씨는 2023 CWE Top 25 Most Dangerous Software Weaknesses

  1. CWE-658 C언어로 작성된 SW에서 발생 가능한 취약점 목록
  2. CWE-659 C++ 언어로 작성된 SW에서 발생 가능한 취약점 목록
  3. CWE-660 Java언어로 작성된 SW에서 발생 가능한 취약점 목록
  4. CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  5. CWE-59 Improper Link Resolution Before File Access ('Link Following')
  6. CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  7. CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  8. CWE-99 Improper Control of Resource Identifiers ('Resource Injection')
  9. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer O
  10. CWE-134 Use of Externally-Controlled Format String
  11. CWE-190 Integer Overflow or Wraparound O 259 Use of Hard-coded Password
  12. CWE-285 Improper Authorization 306 Missing Authentication for Critical Function
  13. CWE-307 Improper Restriction of Excessive Authentication Attempts
  14. CWE-312 Cleartext Storage of Sensitive Information
  15. CWE-319 Cleartext Transmission of Sensitive Information
  16. CWE-321 Use of Hard-coded Cryptographic Key
  17. CWE-327 Use of a Broken or Risky Cryptographic Algorithm
  18. CWE-330 Use of Insufficiently Random Values
  19. CWE-494 Download of Code Without Integrity Check
  20. CWE-521 Weak Password Requirements
  21. CWE-615 Information Exposure Through Comments
  22. CWE-732 Incorrect Permission Assignment for Critical Resource
  23. CWE-759 Use of a One-Way Hash without a Salt
  24. CWE-170 Improper Null Termination O
  25. CWE-209 Generation of Error Message Containing Sensitive Information O
  26. CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition O
  27. CWE-369 Divide By Zero O
  28. CWE-390 Detection of Error Condition Without Action O
  29. CWE-400 Uncontrolled Resource Consumption O
  30. CWE-404 Improper Resource Shutdown or Release O
  31. CWE-415 Double Free O
  32. CWE-416 Use After Free O
  33. CWE-457 Use of Uninitialized Variable O
  34. CWE-467 Use of sizeof() on a Pointer Type O
  35. CWE-469 Use of Pointer Subtraction to Determine Size O
  36. CWE-476 NULL Pointer Dereference O
  37. CWE-489 Active Debug Code O
  38. CWE-495 Private Data Structure Returned From A Public Method O
  39. CWE-496 Public Data Assigned to Private Array-Typed Field O
  40. CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere O
  41. CWE-562 Return of Stack Variable Address O
  42. CWE-587 Assignment of a Fixed Address to a Pointer O
  43. CWE-628 Function Call with Incorrectly Specified Arguments O
  44. CWE-676 Use of Potentially Dangerous Function O
  45. CWE-755 Improper Handling of Exceptional Conditions O

※ O 코딩규칙점검 및 취약점점검 항목과 중복으로 SW 신뢰성시험 시 고려하여 적용

CWE(Common Weakness Enumeration)

CWE - Common Weakness Enumeration

CWE™ is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.

cwe.mitre.org

 

SW 신뢰성 표준 지표 Measure - https://dase.tistory.com/m/141