Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-353 (缺失完整性检查支持) — Vulnerability Class 30

30 vulnerabilities classified as CWE-353 (缺失完整性检查支持). AI Chinese analysis included.

CWE-353 represents a critical architectural weakness where software relies on transmission protocols lacking built-in integrity verification mechanisms, such as checksums or cryptographic hashes. This omission leaves data vulnerable to undetected corruption or malicious tampering during transit, as the application cannot distinguish between legitimate transmission errors and intentional alterations by an attacker. Exploitation typically involves intercepting and modifying data packets in transit, allowing adversaries to inject malicious payloads or alter critical information without triggering immediate detection by the receiving system. To mitigate this risk, developers must implement robust integrity checks at the application layer, utilizing algorithms like HMAC or SHA-256 to validate data authenticity. Additionally, employing secure transport protocols such as TLS ensures that data remains both encrypted and integrity-protected throughout the communication process, effectively closing this security gap.

MITRE CWE Description
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum. If integrity check values or "checksums" are omitted from a protocol, there is no way of determining if data has been corrupted in transmission. The lack of checksum functionality in a protocol removes the first application-level check of data that can be used. The end-to-end philosophy of checks states that integrity checks should be performed at the lowest level that they can be completely implemented. Excluding further sanity checks and input validation performed by applications, the protocol's checksum is the most important level of checksum, since it can be performed more completely than at any previous level and takes into account entire messages, as opposed to single packets.
Common Consequences (2)
Integrity, OtherOther
Data that is parsed and used may be corrupted.
Non-Repudiation, OtherHide Activities, Other
Without a checksum it is impossible to determine if any changes have been made to the data after it was sent.
Mitigations (2)
Architecture and DesignAdd an appropriately sized checksum to the protocol, ensuring that data received may be simply validated before it is parsed and used.
ImplementationEnsure that the checksums present in the protocol design are properly implemented and added to each message before it is sent.
Examples (1)
In this example, a request packet is received, and privileged information is sent to the requester:
while(true) { DatagramPacket rp = new DatagramPacket(rData,rData.length); outSock.receive(rp); InetAddress IPAddress = rp.getAddress(); int port = rp.getPort(); out = secret.getBytes(); DatagramPacket sp =new DatagramPacket(out, out.length, IPAddress, port); outSock.send(sp); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2026-42428 OpenClaw < 2026.4.8 - Missing Integrity Verification in Package Downloads — OpenClaw 7.1 High2026-04-28
CVE-2026-3856 IBM Db2 Recovery Expert Missing Integrity Check — Db2 Recovery Expert 5.3 Medium2026-03-17
CVE-2025-10010 Integrity Validation Bypass in CryptoPro Secure Disk for BitLocker — CryptoPro Secure Disk for BitLocker 7.1AIHighAI2026-02-24
CVE-2025-15364 Download Manager <= 3.3.40 - Unauthenticated Limited Privilege Escalation via updatePassword — Download Manager 7.3 High2026-01-06
CVE-2026-21437 eopkg vulnerable to package file list integrity bypass — eopkg 3.7 -2026-01-01
CVE-2025-48500 BIG-IP APM VPN web client for macOS vulnerability — BIG-IP Edge Client 7.3 High2025-08-13
CVE-2025-48811 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability — Windows 10 Version 1507 6.7 Medium2025-07-08
CVE-2025-48803 Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability — Windows 10 Version 1507 6.7 Medium2025-07-08
CVE-2024-43108 goTenna Pro ATAK Plugin Missing Support for Integrity Check — Pro ATAK Plugin 5.3 Medium2024-09-26
CVE-2024-47123 Missing Support for Integrity Check in goTenna Pro — Pro 5.3 Medium2024-09-26
CVE-2023-32475 Dell BIOS 安全漏洞 — CPG BIOS 7.6 High2024-06-07
CVE-2022-24404 Ciphertext Malleability in TETRA — TETRA Standard 5.9 Medium2023-10-19
CVE-2023-29290 Adobe Commerce Guest Cart Shipping Address Overwrite IDOR — Magento Commerce 5.3 Medium2023-06-15
CVE-2022-2793 Emerson Proficy Machine Edition 数据伪造问题漏洞 — Proficy Machine Edition 5.9 Medium2022-08-19
CVE-2020-7878 VideoOffice 数据伪造问题漏洞 — VideoOffice 9.8 -2021-12-28
CVE-2021-26610 godomall5 remote code execution vulnerability — godomall5 Std, godomall5 Pro 7.2 High2021-10-27
CVE-2021-38396 Missing Support Integrity Check for Boston Scientific Zoom Latitude — ZOOM LATITUDE 6.5 Medium2021-10-04
CVE-2021-26608 handysoft groupware arbitrary file download and execution vulnerability — HShell.dll 8.8 High2021-09-09
CVE-2021-28546 Acrobat Reader DC Missing Support for Integrity Check — Acrobat Reader 6.5 Medium2021-04-01
CVE-2021-28545 Acrobat Reader DC Missing Support for Integrity Check — Acrobat Reader 8.1 High2021-04-01
CVE-2020-7807 DLL Hijacking Vulnerabilities During Installation of LG Electronics Software — (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) 5.6 Medium2020-09-14
CVE-2020-9062 Diebold Nixdorf 2100xe USB ATMs 访问控制错误漏洞 — ProCash 2100xe USB ATM 5.3 -2020-08-21
CVE-2020-10124 NCR SelfServ ATMs APTRA XFS 访问控制错误漏洞 — SelfServ ATM 7.6 -2020-08-21
CVE-2020-7810 HandySoft ActiveX File Download and Execution Vulnerability — hslogin2.dll 8.8 High2020-08-07
CVE-2019-19160 Capsoft Reportexpress ProPlus 数据伪造问题漏洞 — Reportexpress ProPlus 5.7 Medium2020-06-29
CVE-2020-7808 RAONWIZ Inc K Upload, arguments modiffication via missing support for integrity check vulnerability — K Upload 8.7 High2020-05-21
CVE-2019-11480 Ubuntu kernel snap build process could use unauthenticated sources — pc-kernel 8.4 High2020-04-14
CVE-2020-10266 RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot — URx 8.1 -2020-04-06
CVE-2019-10943 多款Siemens产品数据伪造问题漏洞 — SIMATIC Drive Controller family--2019-08-13
CVE-2019-12804 Hunesion i-oneNet Missing Support for Integrity Check vulnerability — i-oneNet 5.5 -2019-07-10

Vulnerabilities classified as CWE-353 (缺失完整性检查支持) represent 30 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.