CWE-321 - Use of Hard-coded Cryptographic Key
- Abstraction:Variant
- Structure:Simple
- Status:Draft
- Release Date:2006-07-19
- Latest Modification Date:2023-06-29
Weakness Name
Use of Hard-coded Cryptographic Key
Description
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
Common Consequences
Scope: Access Control
Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity
Notes: If hard-coded cryptographic keys are used, it is almost certain that malicious users will gain access through the account in question.