CWE-324: Use of a Key Past its Expiration Date
low-riskThe product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-7318 | 4.8 | 1.4% | — |
| CVE-2022-2447 | 6.6 | 0.6% | — |
| CVE-2025-31123 | 8.7 | 0.3% | — |
| CVE-2025-2291 | 8.1 | 0.3% | — |
| CVE-2021-33020 | 8.2 | 0.2% | — |
| CVE-2024-38277 | 5.4 | 0.2% | — |
| CVE-2022-24732 | 6.3 | 0.1% | — |
| CVE-2024-31895 | 4.3 | 0.1% | — |
| CVE-2024-6299 | 4.8 | 0.1% | — |
| CVE-2024-31893 | 4.3 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal