Home / Vulnerability Database / C or C++ : Null initialization vector
C/C++
C or C++ : Null initialization vector
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
HIPAA
CWE
Overview
The application performs encryption with null initialization vector (IV). In case of encrypting related messages with the same key an attacker can obtain information about the message. For secure encryption it is necessary for the IV to be cryptographically pseudorandom, that is, unpredictable to an attacker.
References
- CWE-329: Not Using a Random IV with CBC Mode
- Initialization vector - Wikipedia
- Forced into using a static IV (AES) - security.stackexchange.com
- Why should I use an Initialization Vector (IV) when I have unique keys? - crypto.stackexchange.com
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
MEDIUM
DerScanner Severity Score
Do you want to fix C or C++ : Null initialization vector in your application?
See also
C/C++
C or C++ : Dead store
C/C++
C or C++ : Use after free
C/C++
