logo
Home/CWEs/CWE-323/

CWE-323 - Reusing a Nonce, Key Pair in Encryption

  • Abstraction:Base
  • Structure:Simple
  • Status:Incomplete
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Reusing a Nonce, Key Pair in Encryption

Description

Nonces should be used for the present occasion and only once.

Common Consequences

Scope: Access Control

Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity

Notes: Potentially a replay attack, in which an attacker could send the same data twice, could be crafted if nonces are allowed to be reused. This could allow a user to send a message which masquerades as a valid message from a valid user.

Related Weaknesses

CWE-344Use of Invariant Value in Dynamically Changing Context