Cyber Posture

CWE · MITRE source

CWE-345Insufficient Verification of Data Authenticity

Abstraction: Class · CVEs in our corpus: 557

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (9)AI

Showing the 7 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SC-17Public Key Infrastructure CertificatesSCUse of approved PKI certificates provides verifiable data authenticity and origin for communications and artifacts.
SC-20Secure Name/Address Resolution Service (Authoritative Source)SCMandates provision of authenticity and integrity artifacts that enable verification of name/address resolution data.
SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)SCRequires explicit verification of data authenticity from authoritative sources, preventing acceptance of unauthenticated resolution responses.
SR-4ProvenanceSRProvenance documentation and monitoring directly enables verification of authenticity for components and data throughout their history.
SR-9Tamper Resistance and DetectionSRThe control implements verification mechanisms that detect tampering by ensuring data authenticity.
PT-8Computer Matching RequirementsPTDirectly requires independent verification of matching output before adverse decisions, mitigating insufficient authenticity checks on data from external sources.
SI-7Software, Firmware, and Information IntegritySIMandates verification of data authenticity for software, firmware, and information.
Show 2 more broadly-applicable controls
SC-33Transmission Preparation IntegritySCControl requires verification of data authenticity/integrity (e.g., checksums) after aggregation/packing, directly reducing exploitation of insufficient verification before transmission.
SC-45System Time SynchronizationSCTime synchronization supports reliable freshness verification when checking data authenticity across systems or components.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2023-38831 KEV9.27.80.93862023-08-23
CVE-2016-45536.78.60.82842016-05-10
CVE-2016-45545.98.60.68862016-05-10
CVE-2022-26871 KEV5.19.80.19442022-03-29
CVE-2024-396892.87.50.21232024-07-05
CVE-2024-454102.89.80.13952024-09-19
CVE-2023-517642.75.30.27062023-12-24
CVE-2023-54822.68.80.13862023-11-01
CVE-2021-374212.59.80.08912021-08-30
CVE-2019-112352.29.80.03402019-04-22
CVE-2019-51612.19.10.04902020-03-11
CVE-2022-318002.19.80.01572022-06-21
CVE-2022-208292.19.10.04902022-06-24
CVE-2023-46992.110.00.00912023-11-06
CVE-2017-111032.08.10.05712017-07-13
CVE-2017-31982.09.80.00212018-07-09
CVE-2015-39562.09.80.00182019-03-25
CVE-2018-199712.09.80.00582019-04-16
CVE-2019-66952.09.80.00262019-08-23
CVE-2019-188352.09.80.00162019-11-08
CVE-2019-22892.09.80.00052019-11-21
CVE-2013-21672.09.80.00832019-12-10
CVE-2019-56132.09.80.00222020-02-18
CVE-2016-10000042.09.80.00192020-02-19
CVE-2019-205302.09.80.00072020-03-24