|
| 1 | +--- |
| 2 | +title: Software suply chain CWEs |
| 3 | +--- |
| 4 | + |
| 5 | +What are the CWEs from the [Common Weakness Enumeration](https://cwe.mitre.org/) related to software supply chain issues? |
| 6 | + |
| 7 | +1. Dependency Management: |
| 8 | +- CWE-829: Inclusion of Functionality from Untrusted Control Sphere |
| 9 | +- CWE-494: Download of Code Without Integrity Check |
| 10 | +- CWE-1021: Improper Restriction of Rendered UI Layers or Frames |
| 11 | +- CWE-937: Using Components with Known Vulnerabilities |
| 12 | +- CWE-1104: Use of Unmaintained Third Party Components |
| 13 | +- CWE-940: Improper Verification of Source of a Communication Channel |
| 14 | + |
| 15 | +2. Build Process: |
| 16 | +- CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes |
| 17 | +- CWE-506: Embedded Malicious Code |
| 18 | +- CWE-912: Hidden Functionality |
| 19 | + |
| 20 | +3. Crypto and Secrets |
| 21 | +- CWE-347: Improper Verification of Cryptographic Signature |
| 22 | +- CWE-354: Improper Validation of Integrity Check Value |
| 23 | +- CWE-798: Use of Hard-coded Credentials |
| 24 | +- CWE-311: Missing Encryption of Sensitive Data |
| 25 | +- CWE-326: Inadequate Encryption Strength |
| 26 | + |
| 27 | +4. Update Mechanisms: |
| 28 | +- CWE-441: Unintended Proxy or Intermediary |
| 29 | +- CWE-494: Download of Code Without Integrity Check |
| 30 | +- CWE-799: Improper Control of Interaction Frequency |
| 31 | + |
| 32 | +5. Repository Security: |
| 33 | +- CWE-284: Improper Access Control |
| 34 | +- CWE-287: Improper Authentication |
| 35 | +- CWE-522: Insufficiently Protected Credentials |
| 36 | + |
| 37 | +6. Configuration Management: |
| 38 | +- CWE-16: Configuration |
| 39 | +- CWE-520: .NET Misconfiguration: Use of Impersonation |
0 commit comments