Read Time:15 Second

Description

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-693

 

Consequences

Integrity, Other: Varies by Context, Unexpected State

 

Potential Mitigations

CVE References