Skip to content

Commit

Permalink
broken_cryptography fix for cvss, cwe and remediation
Browse files Browse the repository at this point in the history
  • Loading branch information
jhadeepakkumar14 committed Nov 17, 2023
1 parent e284a20 commit 54343a9
Show file tree
Hide file tree
Showing 3 changed files with 49 additions and 49 deletions.
26 changes: 13 additions & 13 deletions mappings/cvss_v3/cvss_v3.json
Original file line number Diff line number Diff line change
Expand Up @@ -966,6 +966,19 @@
}
]
},
{
"id": "broken_cryptography",
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"id": "use_of_vulnerable_cryptographic_library",
"cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
]
},
{
"id": "side_channel_attack",
"children": [
Expand Down Expand Up @@ -1001,19 +1014,6 @@
}
]
},
{
"id": "broken_cryptography",
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"cvss_v3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"id": "use_of_vulnerable_cryptographic_library",
"cvss_v3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
]
},
{
"id": "privacy_concerns",
"children": [
Expand Down
28 changes: 14 additions & 14 deletions mappings/cwe/cwe.json
Original file line number Diff line number Diff line change
Expand Up @@ -552,6 +552,20 @@
}
]
},
{
"id": "broken_cryptography",
"cwe": ["CWE-327"],
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"cwe": ["CWE-327"]
},
{
"id": "use_of_vulnerable_cryptographic_library",
"cwe": ["CWE-327"]
}
]
},
{
"id": "side_channel_attack",
"cwe": ["CWE-203", "CWE-1300"],
Expand Down Expand Up @@ -588,20 +602,6 @@
}
]
},
{
"id": "broken_cryptography",
"cwe": ["CWE-327"],
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"cwe": ["CWE-327"]
},
{
"id": "use_of_vulnerable_cryptographic_library",
"cwe": ["CWE-327"]
}
]
},
{
"id": "privacy_concerns",
"cwe": ["CWE-359"]
Expand Down
44 changes: 22 additions & 22 deletions mappings/remediation_advice/remediation_advice.json
Original file line number Diff line number Diff line change
Expand Up @@ -1382,6 +1382,28 @@
}
]
},
{
"id": "broken_cryptography",
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"remediation_advice": "The use of broken, weak, or flawed cryptographic algorithms can allow an attacker to decrypt sensistive information. Ensure the application makes use of only trustworthy cryprographic algorithms as indicated by relevant security standard(s) and regulation(s).",
"references": [
"https://codeql.github.com/codeql-query-help/java/java-weak-cryptographic-algorithm/",
"https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexa.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf"
]
},
{
"id": "use_of_vulnerable_cryptographic_library",
"remediation_advice": "The identification, patching, and disclosure of vulnerabilities in third-party libraries, including cryptographic libraries, is a daily occurrence. In some cases, cryptographic libraries are deemed 'broken' and deprecated. Ensure the application is updated to include the latest secure version of all third-party cryptographic libraries and replace known 'broken' cryptographic libraries with secure alternatives.",
"references": [
"https://www.ubiqsecurity.com/bouncy-castle-and-the-impact-of-cryptographic-vulnerabilities/",
"https://blog.cryptographyengineering.com/2013/09/20/rsa-warns-developers-against-its-own/"
]
}
]
},
{
"id": "side_channel_attack",
"children": [
Expand Down Expand Up @@ -1449,28 +1471,6 @@
}
]
},
{
"id": "broken_cryptography",
"children": [
{
"id": "use_of_broken_cryptographic_primitive",
"remediation_advice": "The use of broken, weak, or flawed cryptographic algorithms can allow an attacker to decrypt sensistive information. Ensure the application makes use of only trustworthy cryprographic algorithms as indicated by relevant security standard(s) and regulation(s).",
"references": [
"https://codeql.github.com/codeql-query-help/java/java-weak-cryptographic-algorithm/",
"https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexa.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf"
]
},
{
"id": "use_of_vulnerable_cryptographic_library",
"remediation_advice": "The identification, patching, and disclosure of vulnerabilities in third-party libraries, including cryptographic libraries, is a daily occurrence. In some cases, cryptographic libraries are deemed 'broken' and deprecated. Ensure the application is updated to include the latest secure version of all third-party cryptographic libraries and replace known 'broken' cryptographic libraries with secure alternatives.",
"references": [
"https://www.ubiqsecurity.com/bouncy-castle-and-the-impact-of-cryptographic-vulnerabilities/",
"https://blog.cryptographyengineering.com/2013/09/20/rsa-warns-developers-against-its-own/"
]
}
]
},
{
"id": "privacy_concerns",
"remediation_advice": "1. Avoid storing unnecessary data where possible.\n2. Purge all known unnecessary data when identified on the device or application.\n3. Purge all known unnecessary data in known cached locations.\n4. Purge all known unnecessary data on known backup locations.",
Expand Down

0 comments on commit 54343a9

Please sign in to comment.