CWE-353: Missing Support for Integrity Check
low-riskThe product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
Abstraction: Base
Common Consequences
Integrity
→
Other
Non-Repudiation
→
Hide Activities
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2020-10124 | 7.1 | 2.6% | — |
| CVE-2021-28545 | 8.1 | 1.2% | — |
| CVE-2019-11480 | 8.4 | 0.4% | — |
| CVE-2021-28546 | 6.5 | 0.4% | — |
| CVE-2020-7878 | 9.8 | 0.3% | — |
| CVE-2023-28865 | 6.6 | 0.3% | — |
| CVE-2019-19160 | 5.7 | 0.3% | — |
| CVE-2020-7808 | 8.7 | 0.2% | — |
| CVE-2021-26608 | 8.8 | 0.2% | — |
| CVE-2025-48811 | 6.7 | 0.2% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal