CWE-1279: Cryptographic Operations are run Before Supporting Units are Ready

low-risk

Performing cryptographic operations without ensuring that the supporting inputs are ready to supply valid data may compromise the cryptographic result.

Abstraction: Base

Common Consequences

Access Control Varies by Context

Real-World Examples (2)

CVE CVSS EPSS KEV
CVE-2023-4489 6.4 0.7%
CVE-2024-22473 6.8 0.1%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal