logo

CWE-321 - Use of Hard-coded Cryptographic Key

  • Abstraction:Variant
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Use of Hard-coded Cryptographic Key

Description

The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

Common Consequences

Scope: Access Control

Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity

Notes: If hard-coded cryptographic keys are used, it is almost certain that malicious users will gain access through the account in question.

Related Weaknesses