Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-314 (在注册表中的明文存储) — Vulnerability Class 1

1 vulnerabilities classified as CWE-314 (在注册表中的明文存储). AI Chinese analysis included.

CWE-314 represents a critical data exposure weakness where applications store sensitive information in plaintext within the Windows Registry. This flaw typically allows attackers to exploit the vulnerability by directly accessing specific registry keys using standard system tools or malicious scripts, bypassing application-level security controls. Even if data appears obscured through simple encoding, adversaries can easily identify the encoding scheme and reverse it to retrieve the original plaintext, rendering such measures ineffective. To mitigate this risk, developers must avoid storing secrets like passwords or cryptographic keys in the registry altogether. Instead, they should utilize dedicated secure storage mechanisms, such as the Windows Data Protection API (DPAPI) or hardware-backed key stores, which provide robust encryption and access controls. Implementing these practices ensures that sensitive data remains protected against unauthorized local access and significantly reduces the attack surface for credential theft.

MITRE CWE Description
The product stores sensitive information in cleartext in the registry. Attackers can read the information by accessing the registry key. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Common Consequences (1)
ConfidentialityRead Application Data
CVE IDTitleCVSSSeverityPublished
CVE-2023-2335 Plaintext Password in Registry — surelock windows 6.5 Medium2023-04-27

Vulnerabilities classified as CWE-314 (在注册表中的明文存储) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.