logo
Home/CWEs/CWE-321/

CWE-321 - Use of Hard-coded Cryptographic Key

  • Abstraction:Variant
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2025-04-03

Weakness Name

Use of Hard-coded Cryptographic Key

Description

The product uses a hard-coded, unchangeable cryptographic key.

Common Consequences

Scope: Access Control

Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity, Read Application Data

Notes: If hard-coded cryptographic keys are used, it is almost certain that malicious users will gain access through the account in question. The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

Related Weaknesses

CWE-798Use of Hard-coded CredentialsHigh