logo

CWE-360 - Trust of System Event Data

CWE-360 High

  • Abstraction:
  • Base
  • Structure:
  • Simple
  • Status:
  • Incomplete
Weakness Name

Trust of System Event Data

Description

Security based on event locations are insecure and can be spoofed.

Events are a messaging system which may provide control data to programs listening for events. Events often do not have any type of authentication framework to allow them to be verified from a trusted source. Any application, in Windows, on a given desktop can send a message to any window on the same desktop. There is no authentication framework for these messages. Therefore, any message can be used to manipulate any process on the desktop if the process does not check the validity and safeness of those messages.

Common Consequences

Scope: Integrity, Confidentiality, Availability, Access Control

Impact: Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands

Notes: If one trusts the system-event information and executes commands based on it, one could potentially take actions based on a spoofed identity.

Related Weaknesses
  • Release Date:
  • 2006-07-19
  • Latest Modification Date:
  • 2023-10-26

Free security scan for your website