Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-319 (敏感数据的明文传输) — Vulnerability Class 356

356 vulnerabilities classified as CWE-319 (敏感数据的明文传输). AI Chinese analysis included.

CWE-319 represents a critical security weakness where applications transmit sensitive or security-critical data in cleartext over communication channels susceptible to interception. Attackers typically exploit this vulnerability by employing network sniffing tools to capture unencrypted packets, thereby gaining unauthorized access to confidential information such as login credentials, personal identifiable information, or financial data. This exposure occurs because the data lacks encryption during transit, allowing malicious actors to read the contents without authentication. To prevent this, developers must implement robust encryption protocols, such as TLS or SSL, for all data in transit. Additionally, enforcing strict security policies that mandate encrypted connections for all sensitive communications ensures that data remains protected against eavesdropping and man-in-the-middle attacks, maintaining confidentiality and integrity throughout the transmission process.

MITRE CWE Description
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Common Consequences (2)
Integrity, ConfidentialityRead Application Data, Modify Files or Directories
Anyone can read the information by gaining access to the channel being used for communication. Many communication channels can be "sniffed" (monitored) by adversaries during data transmission. For example, in networking, packets can traverse many intermediary nodes from the source to the destination…
Integrity, ConfidentialityRead Application Data, Modify Files or Directories, Other
When full communications are recorded or logged, such as with a packet dump, an adversary could attempt to obtain the dump long after the transmission has occurred and try to "sniff" the cleartext from the recorded communications in the dump itself. Even if the information is encoded in a way that i…
Mitigations (5)
Architecture and DesignBefore transmitting, encrypt the data using reliable, confidentiality-protecting cryptographic protocols.
ImplementationWhen using web applications with SSL, use SSL for the entire session from login to logout, not just for the initial login page.
ImplementationWhen designing hardware platforms, ensure that approved encryption algorithms (such as those recommended by NIST) protect paths from security critical data to trusted user applications.
TestingUse tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.
OperationConfigure servers to use encrypted channels for communication, which may include SSL or other secure protocols.
Examples (2)
The following code attempts to establish a connection to a site to communicate sensitive information.
try { URL u = new URL("http://www.secret.example.org/"); HttpURLConnection hu = (HttpURLConnection) u.openConnection(); hu.setRequestMethod("PUT"); hu.connect(); OutputStream os = hu.getOutputStream(); hu.disconnect(); } catch (IOException e) { //... }
Bad · Java
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these…
CVE IDTitleCVSSSeverityPublished
CVE-2022-45478 Telepad 安全漏洞 — Telepad 5.9 -2022-12-05
CVE-2022-45480 BEApps Mobile PC Keyboard 安全漏洞 — PC Keyboard WiFi & Bluetooth 5.3 -2022-12-02
CVE-2022-45483 thisAAY Lazy Mouse 安全漏洞 — Lazy Mouse 5.9 -2022-12-02
CVE-2022-39339 Cleartext Transmission of Sensitive Information in user_oidc — security-advisories 4.3 Medium2022-11-25
CVE-2021-35246 Unprotected Transport of Credentials (HSTS) Vulnerability — Engineer's Toolset 5.3 Medium2022-11-23
CVE-2022-38122 POWERCOM CO., LTD. UPSMON PRO - Cleartext Transmission of Sensitive Information — UPSMON PRO 7.5 High2022-11-10
CVE-2022-33321 Mitsubishi Electric consumer electronics products 安全漏洞 — PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-M 9.1 -2022-11-08
CVE-2021-39077 IBM Security Guardium information disclosure — Security Guardium 4.4 Medium2022-11-03
CVE-2021-45447 Pentaho Business Analytics Server - With the Data Lineage feature enabled, the system transmits database passwords in clear text — Pentaho Business Analytics Server 7.7 High2022-11-02
CVE-2022-41636 Haas Automation Controller 安全漏洞 — Haas CNC Controller 9.1 Critical2022-10-28
CVE-2022-41983 BIG-IP TMM Vulnerability CVE-2022-41983 — BIG-IP 3.7 Low2022-10-19
CVE-2022-39287 Plaintext transmission of CSRF tokens in tiny-csrf — tiny-csrf 8.1 High2022-10-07
CVE-2022-39269 Media transport downgrade from the secure version (SRTP) to non-secure (RTP) in pjsip — pjproject 9.1 Critical2022-10-06
CVE-2022-32227 Rocket.Chat 信息泄露漏洞 — Rocket.Chat 6.5 -2022-09-23
CVE-2022-2485 AutomationDirect Stride Field I/O Cleartext Transmission of Sensitive Information — SIO-MB04RTDS 9.6 Critical2022-08-31
CVE-2022-2003 AutomationDirect DirectLOGIC with Serial Communication Cleartext Transmission — DirectLOGIC D0-06 series CPUs 7.7 High2022-08-31
CVE-2022-2005 AutomationDirect C-more EA9 HMI Cleartext Transmission — C-more EA9 7.5 High2022-08-31
CVE-2022-2338 Softing Secure Integration Server Cleartext Transmission of Sensitive Information — Secure Integration Server 5.7 Medium2022-08-17
CVE-2022-32245 SAP BusinessObjects Business Intelligence Platform 安全漏洞 — SAP BusinessObjects Business Intelligence Platform (Open Document) 8.2 -2022-08-09
CVE-2022-27619 Synology Note Station 安全漏洞 — Synology Note Station Client 6.8 Medium2022-08-03
CVE-2022-1524 3.2.5 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 — NextSeq 550Dx 7.4 High2022-06-24
CVE-2022-21829 PortlandLabs Concrete Cms 安全漏洞 — https://github.com/concrete5/concrete5 9.8 -2022-06-24
CVE-2022-21184 Bachmann Visutec GmbH Atvise 安全漏洞 — Atvise 5.9 -2022-06-17
CVE-2022-26077 Open Automation Software OAS Platform 安全漏洞 — OAS Platform 7.5 High2022-05-25
CVE-2021-32966 Philips Interoperability Solution XDS - Clear Text Transmission of Sensitive Information — Interoperability Solution XDS 3.7 Low2022-05-25
CVE-2022-21951 Rancher: Weave CNI password is not set if RKE template is used with CNI value overridden — Rancher 6.8 Medium2022-05-25
CVE-2021-32934 ThroughTek P2P SDK - Cleartext Transmission of Sensitive Information — P2P SDK 9.1 Critical2022-05-19
CVE-2022-30993 Cleartext transmission of sensitive information — Acronis Cyber Protect 15 7.5 -2022-05-18
CVE-2022-30994 Cleartext transmission of sensitive information — Acronis Cyber Protect 15 7.5 -2022-05-18
CVE-2022-29874 Siemens SICAM 安全漏洞 — SICAM T 8.8 High2022-05-10

Vulnerabilities classified as CWE-319 (敏感数据的明文传输) represent 356 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.