CWE-314 - Cleartext Storage in the Registry
CWE-314
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
Cleartext Storage in the Registry
- Description
The product stores sensitive information in cleartext in the registry.
Attackers can read the information by accessing the registry key. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
- Common Consequences
Scope: Confidentiality
Impact: Read Application Data
- Related Weaknesses
- Release Date:
- 2006-07-19
- Latest Modification Date:
- 2023-06-29
Free security scan for your website