1 vulnerabilities classified as CWE-314 (在注册表中的明文存储). AI Chinese analysis included.
CWE-314 represents a critical data exposure weakness where applications store sensitive information in plaintext within the Windows Registry. This flaw typically allows attackers to exploit the vulnerability by directly accessing specific registry keys using standard system tools or malicious scripts, bypassing application-level security controls. Even if data appears obscured through simple encoding, adversaries can easily identify the encoding scheme and reverse it to retrieve the original plaintext, rendering such measures ineffective. To mitigate this risk, developers must avoid storing secrets like passwords or cryptographic keys in the registry altogether. Instead, they should utilize dedicated secure storage mechanisms, such as the Windows Data Protection API (DPAPI) or hardware-backed key stores, which provide robust encryption and access controls. Implementing these practices ensures that sensitive data remains protected against unauthorized local access and significantly reduces the attack surface for credential theft.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-2335 | Plaintext Password in Registry — surelock windows | 6.5 | Medium | 2023-04-27 |
Vulnerabilities classified as CWE-314 (在注册表中的明文存储) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.