Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-322 (未进行实体认证的密钥交换) — Vulnerability Class 20

20 vulnerabilities classified as CWE-322 (未进行实体认证的密钥交换). AI Chinese analysis included.

CWE-322 represents a critical cryptographic weakness where a system establishes an encrypted key exchange without verifying the identity of the participating entities. This flaw allows attackers to execute man-in-the-middle attacks by intercepting and modifying traffic between two parties, effectively impersonating one or both actors. Although the resulting communication channel remains encrypted and intact, the lack of authentication means the parties cannot trust the source of the data. Developers mitigate this vulnerability by implementing robust mutual authentication protocols, such as requiring digital certificates or pre-shared keys before initiating key exchange. By ensuring that both sides verify each other’s identities through trusted third parties or cryptographic signatures, organizations can prevent unauthorized interception and maintain the true integrity of the communication session.

MITRE CWE Description
The product performs a key exchange with an actor without verifying the identity of that actor. Performing a key exchange will preserve the integrity of the information sent between two entities, but this will not guarantee that the entities are who they claim they are. This may enable an attacker to impersonate an actor by modifying traffic between the two entities. Typically, this involves a victim client that contacts a malicious server that is impersonating a trusted server. If the client skips authentication or ignores an authentication failure, the malicious server may request authentication information from the user. The malicious server can then use this authentication information to log in to the trusted server using the victim's credentials, sniff traffic between the victim and trusted server, etc.
Common Consequences (2)
Access ControlBypass Protection Mechanism
No authentication takes place in this process, bypassing an assumed protection of encryption.
ConfidentialityRead Application Data
The encrypted communication between a user and a trusted host may be subject to sniffing by any actor in the communication path.
Mitigations (2)
Architecture and DesignEnsure that proper authentication is included in the system design.
ImplementationUnderstand and properly implement all checks necessary to ensure the identity of entities involved in encrypted communications.
Examples (1)
Many systems have used Diffie-Hellman key exchange without authenticating the entities exchanging keys, allowing attackers to influence communications by redirecting or interfering with the communication path. Many people using SSL/TLS skip the authentication (often unknowingly).
CVE IDTitleCVSSSeverityPublished
CVE-2026-1354 Zero Motorcycles Firmware Key Exchange without Entity Authentication — Zero Motorcycles firmware 6.4 Medium2026-04-21
CVE-2025-13914 Apstra: SSH host key validation vulnerability for managed devices — Apstra 8.7 High2026-04-09
CVE-2026-33697 CoCoS attested TLS is vulnerable to relay attacks via extracted ephemeral TLS keys — cocos 7.5 High2026-03-26
CVE-2026-1709 Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication — Red Hat Enterprise Linux 10 9.4 Critical2026-02-06
CVE-2025-62501 SSH Hostkey Misconfiguration Vulnerability in TP-Link Archer AX53 — Archer AX53 v1.0 8.1AIHighAI2026-02-03
CVE-2025-20163 Cisco Nexus Dashboard Fabric Controller SSH Host Key Vulnerability — Cisco Data Center Network Manager 8.7 High2025-06-04
CVE-2024-47519 Backup uploads to ETM subject to man-in-the-middle interception — Arista Edge Threat Management 8.3 High2025-01-10
CVE-2024-7516 Brocade Fabric OS before 9.2.2 does not enforce strict host key checking — Fabric OS 7.5AIHighAI2024-11-12
CVE-2024-6572 Improper host key checking in active check 'Check SFTP Service' and special agent 'VNX quotas and filesystem' — Checkmk 5.9AIMediumAI2024-09-09
CVE-2024-4871 Foreman: host ssh key not being checked in remote execution 6.8 Medium2024-05-14
CVE-2022-39254 When matrix-nio receives forwarded room keys, the receiver doesn't check if it requested the key from the forwarder — matrix-nio 8.6 High2022-09-29
CVE-2022-39252 When matrix-rust-sdk recieves forwarded room keys, the reciever doesn't check if it requested the key from the forwarder — matrix-rust-sdk 8.6 High2022-09-29
CVE-2022-39250 Matrix JavaScript SDK vulnerable to key/device identifier confusion in SAS verification — matrix-js-sdk 8.6 High2022-09-29
CVE-2022-39257 Matrix iOS SDK vulnerable to impersonation via forwarded Megolm sessions — matrix-ios-sdk 7.5 High2022-09-28
CVE-2022-39255 Matrix iOS SDK vulnerable ton Olm/Megolm protocol confusion — matrix-ios-sdk 8.6 High2022-09-28
CVE-2022-39248 matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion — matrix-android-sdk2 8.6 High2022-09-28
CVE-2022-39246 matrix-android-sdk2 vulnerable to impersonation via forwarded Megolm sessions — matrix-android-sdk2 7.5 High2022-09-28
CVE-2022-39251 Matrix Javascript SDK vulnerable to Olm/Megolm protocol confusion — matrix-js-sdk 8.6 High2022-09-28
CVE-2022-39249 Matrix Javascript SDK vulnerable to impersonation via forwarded Megolm sessions — matrix-js-sdk 7.5 High2022-09-28
CVE-2021-34433 Eclipse Californium 数据伪造问题漏洞 — Eclipse Californium 7.5 -2021-08-20

Vulnerabilities classified as CWE-322 (未进行实体认证的密钥交换) represent 20 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.