CWE-656: Reliance on Security Through Obscurity
low-riskThe product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.
Abstraction: Class
Common Consequences
Confidentiality
→
Other
Real-World Examples (6)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2020-10284 | 9.1 | 0.5% | — |
| CVE-2020-10286 | 8.8 | 0.2% | — |
| CVE-2025-25983 | 3.4 | 0.2% | — |
| CVE-2024-9138 | 7.2 | 0.1% | — |
| CVE-2024-5244 | 4.2 | 0.1% | — |
| CVE-2020-10277 | 6.4 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal