LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CWE WEAKNESSES  /  CWE-522

CWE-522

Insufficiently Protected Credentials

Class

What it is

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Impact

Access ControlGain Privileges or Assume Identity

Mitigations

  • [Architecture and Design] Use an appropriate security mechanism to protect the credentials.
  • [Architecture and Design] Make appropriate use of cryptography to protect the credentials.
  • [Implementation] Use industry standards to protect the credentials (e.g. LDAP, keystore, etc.).

Real-world CVE examples

  • CVE-2022-30018 — A messaging platform serializes all elements of User/Group objects, making private information available to adversaries
  • CVE-2022-29959 — Initialization file contains credentials that can be decoded using a "simple string transformation"
  • CVE-2022-35411 — Python-based RPC framework enables pickle functionality by default, allowing clients to unpickle untrusted data.
  • CVE-2022-29519 — Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens.
  • CVE-2022-30312 — Building Controller uses a protocol that transmits authentication credentials in plaintext.
  • CVE-2022-31204 — Programmable Logic Controller (PLC) sends password in plaintext.
  • CVE-2022-30275 — Remote Terminal Unit (RTU) uses a driver that relies on a password stored in plaintext.
  • CVE-2007-0681 — Web app allows remote attackers to change the passwords of arbitrary users without providing the original password, and possibly perform other unauthorized acti
  • CVE-2000-0944 — Web application password change utility doesn't check the original password.
  • CVE-2005-3435 — product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
  • CVE-2005-0408 — chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.

Related weaknesses

Test & detect

Browse all common weaknesses, check related exploited CVEs, or map to ATT&CK techniques.

Source: MITRE CWE. View on cwe.mitre.org →

Scroll to Top