Key Exchange without Entity Authentication |
Weakness ID: 322 (Weakness Base) | Status: Draft |
Description Summary
Extended Description
Performing a key exchange will preserve the integrity of the information sent between two entities, but this will not guarantee that the entities are who they claim they are. This may enable a set of "man-in-the-middle" attacks. Typically, this involves a victim client that contacts a malicious server that is impersonating a trusted server. If the client skips authentication or ignores an authentication failure, the malicious server may request authentication information from the user. The malicious server can then use this authentication information to log in to the trusted server using the victim's credentials, sniff traffic between the victim and trusted server, etc.
Scope | Effect |
---|---|
Authentication | No authentication takes place in this process, bypassing an assumed protection of encryption. |
Confidentiality | The encrypted communication between a user and a trusted host may be subject to a "man-in-the-middle" sniffing attack. |
Example 1
Many systems have used Diffie-Hellman key exchange without authenticating the entities exchanging keys, leading to man-in-the-middle attacks. Many people using SSL/TLS skip the authentication (often unknowingly).
Phase: Architecture and Design Ensure that proper authentication is included in the system design. |
Phase: Implementation Understand and properly implement all checks necessary to ensure the identity of entities involved in encrypted communications. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 287 | Improper Authentication | Research Concepts (primary)1000 |
ChildOf | ![]() | 320 | Key Management Errors | Development Concepts (primary)699 |
ChildOf | ![]() | 345 | Insufficient Verification of Data Authenticity | Research Concepts1000 |
PeerOf | ![]() | 296 | Improper Following of Chain of Trust for Certificate Validation | Research Concepts1000 |
PeerOf | ![]() | 298 | Improper Validation of Certificate Expiration | Research Concepts1000 |
PeerOf | ![]() | 299 | Improper Check for Certificate Revocation | Research Concepts1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
CLASP | Key exchange without entity authentication |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
CLASP | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
2008-10-10 | CWE Content Team | MITRE | Internal | |
clarified the description | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description, Other Notes | ||||
2009-07-27 | CWE Content Team | MITRE | Internal | |
updated Relationships |