CWE-321

Use of Hard-coded Cryptographic Key
AI Translation Available

The product uses a hard-coded, unchangeable cryptographic key.

Status
draft
Abstraction
variant
Likelihood
high
ICS/OT

Common Consequences

access control
Impacts
bypass protection mechanism gain privileges or assume identity read application data

Detection Methods

automated static analysis

Potential Mitigations

Phases:
architecture and design
Descriptions:
• Prevention schemes mirror that of hard-coded password storage.