What Is CWE? Overview + CWE Top 25
CWE and CWE Top 25 secure coding practices help you safeguard your code against rising software security risks. Here we explain what is CWE and the CWE Top 25.
Read along or jump ahead to the section that interests you the most:
What Is CWE?
Sponsored by the MITRE Corporation, the community is made up of representatives from major operating systems vendors, commercial information security tool vendors, academia, government agencies, and research institutions.
The full list is regularly updated every few months with the latest version released in August 2020. The security weakness list includes over 600 categories, which include:
- Buffer overflow
- Cross-site scripting
- Insecure random numbers
📕 Related Resource: Learn about the top embedded security vulnerabilities.
Back to top
What Is CWE Top 25?
Published by MITRE, the CWE Top 25 is a compilation of the most widespread and critical weaknesses that could lead to severe software vulnerabilities. The most recent list was published in 2020 and listed vulnerabilities that allowed hackers to gain control over an affected system, steal sensitive data, and cause a denial-of-service condition.
CWE Top 25
Here is the list of the 2020 CWE Top 25 software weaknesses:
- Improper Neutralization of Input During Web Page Generation (“Cross-site Scripting”)
- Out-of-bounds Write
- Improper Input Validation
- Out-of-bounds Read
- Improper Restriction of Operations within the Bounds of a Memory Buffer
- Improper Neutralization of Special Elements used in an SQL Command (“SQL Injection”)
- Exposure of Sensitive Information to an Unauthorized Actor
- Use After Free
- Cross-Site Request Forgery (CSRF)
- Improper Neutralization of Special Elements used in an OS Command (“OS Command Injection)
- Integer Overflow or Wraparound
- Improper Limitation of a Pathname to a Restricted Directory (“Path Traversal”)
- NULL Pointer Dereference
- Improper Authentication
- Unrestricted Upload of File with Dangerous Type
- Incorrect Permission Assignment for Critical Resource
- Improper Control of Generation of Code (“Code Injection”)
- Insufficiently Protected Credentials
- Improper Restriction of XML External Entity Reference
- Use of Hard-coded Credentials
- Deserialization of Untrusted Data
- Improper Privilege Management
- Uncontrolled Resource Consumption
- Missing Authentication for Critical Function
- Missing Authorization
How to Ensure CWE Security with Static Analysis?
SAST tools identify and eliminate security vulnerabilities and software defects early on in development. This helps to ensure that your software is secure, reliable, and compliant.
Klocwork helps you:
- Identify and analyze security risks and prioritizes severity.
- Fulfill compliance standard requirements.
- Apply and enforce coding standards.
- Verify and validate through testing.
- Achieve compliance and get certified faster.
📕 Related Resource: Review the SAST tutorial for additional software security resources.
Back to top
Use Klocwork to Ensure Software Security
See for yourself how Klocwork can help you enforce software security standards, register for a free trial.Back to top