CWE-314
Cleartext Storage in the Registry
VariantDraft
Description
The product stores sensitive information in cleartext in the registry.
Attackers can read the information by accessing the registry key. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Hierarchy (View 1000)
Parents
Children
none
Related attack patterns (CAPEC)
CAPEC-37
CVEs mapped to this weakness (0)
No CVEs match the current filter.