logo

355 Insufficient data authenticity validation - Checksum verification


Description

The application does not properly validate the integrity of resources loaded from external servers.


Impact

Use third-party resources without verifying that the integrity has not been compromised.


Recommendation

Validate the integrity of all resources originating from sources controlled by third parties.


Threat

Anonymous attacker from Internet with write access to a resource used by the application.


Expected Remediation Time

15 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: U

Requirements


Fixes


Last updated

2024/02/20