CWE-1279: Cryptographic Operations are run Before Supporting Units are Ready
low-riskPerforming cryptographic operations without ensuring that the supporting inputs are ready to supply valid data may compromise the cryptographic result.
Abstraction: Base
Common Consequences
Access Control
→
Varies by Context
Real-World Examples (2)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2023-4489 | 6.4 | 0.7% | — |
| CVE-2024-22473 | 6.8 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal