CWE-311: Missing Encryption of Sensitive Data
low-riskThe product does not encrypt sensitive or critical information before storage or transmission.
Common Consequences
Detection Methods
The characterizaton of sensitive data often requires domain-specific understanding, so manual methods are useful. However, manual efforts might not achieve desired code coverage within limited time constraints. Black box methods may produce artifacts (e.g. stored data or unencrypted network transfer) that require manual evaluation.
Automated measurement of the entropy of an input/output source may indicate the use or lack of encryption, but human analysis is still required to distinguish intentionally-unencrypted data (e.g. metadata) from sensitive data.
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Web Application Scanner Web Services Scanner Database Scanners
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Network Sniffer Cost effective for partial coverage: Fuzz Tester Framework-based Fuzzer Automated Monitored Execution Man-in-the-middle attack tool
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Focused Manual Spotcheck - Focused manual analysis of source Manual Source Code Review (not inspections)
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Context-configured Source Code Weakness Analyzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.) Formal Methods / Correct-By-Construction Cost effective for partial coverage: Attack Modeling
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2017-8221 | 7.5 | 19.1% | — |
| CVE-2019-0307 | 2.4 | 6.1% | — |
| CVE-2026-27944 | 9.8 | 4.2% | — |
| CVE-2019-11367 | 9.8 | 3.7% | — |
| CVE-2023-28841 | 6.8 | 3.1% | — |
| CVE-2023-28841 | 6.8 | 3.1% | — |
| CVE-2020-10124 | 7.1 | 2.6% | — |
| CVE-2019-11523 | 9.8 | 2.5% | — |
| CVE-2024-42657 | 7.5 | 2.1% | — |
| CVE-2016-10593 | 8.1 | 1.5% | — |