CWE · MITRE source
CWE-353Missing Support for Integrity Check
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
If integrity check values or "checksums" are omitted from a protocol, there is no way of determining if data has been corrupted in transmission. The lack of checksum functionality in a protocol removes the first application-level check of data that can be used. The end-to-end philosophy of checks states that integrity checks should be performed at the lowest level that they can be completely implemented. Excluding further sanity checks and input validation performed by applications, the protocol's checksum is the most important level of checksum, since it can be performed more completely than at any previous level and takes into account entire messages, as opposed to single packets.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (11)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
SA-10 | Developer Configuration Management | SA | Requiring control over the integrity of all changes directly compels developers to implement integrity verification mechanisms rather than omitting them. |
SA-18 | Tamper Resistance and Detection | SA | Tamper detection fundamentally depends on integrity-checking capabilities that this control mandates or strengthens. |
SA-19 | Component Authenticity | SA | Explicitly requires support for integrity and authenticity checks on components before acceptance into the system. |
SR-11 | Component Authenticity | SR | The control mandates support for integrity-checking mechanisms to identify non-genuine components. |
SR-4 | Provenance | SR | Maintaining valid provenance requires supporting integrity checks on the origin and chain of custody for systems and data. |
SR-9 | Tamper Resistance and Detection | SR | Tamper protection programs explicitly add integrity checks where support was previously missing. |
SC-20 | Secure Name/Address Resolution Service (Authoritative Source) | SC | Supplies the integrity-check artifacts (e.g., RRSIG, DNSKEY) that were previously missing for DNS responses. |
SC-33 | Transmission Preparation Integrity | SC | Control explicitly adds support for integrity mechanisms such as checksums during preparation, preventing attacks that rely on missing integrity checks. |
AU-10 | Non-repudiation | AU | Irrefutable evidence of actions requires integrity protection to prevent tampering or alteration of records. |
CM-14 | Signed Components | CM | Implements required signature-based integrity verification, addressing missing support for integrity checks on components. |
SI-7 | Software, Firmware, and Information Integrity | SI | Directly supplies the missing integrity verification mechanism the weakness describes. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2020-7878 | 2.0 | 9.8 | 0.0034 | 2021-12-28 |
CVE-2020-7808 | 1.8 | 8.7 | 0.0024 | 2020-05-21 |
CVE-2020-7810 | 1.8 | 8.8 | 0.0020 | 2020-08-07 |
CVE-2021-26608 | 1.8 | 8.8 | 0.0023 | 2021-09-09 |
CVE-2019-11480 | 1.7 | 8.4 | 0.0043 | 2020-04-14 |
CVE-2021-28545 | 1.7 | 8.1 | 0.0164 | 2021-04-01 |
CVE-2020-10266 | 1.6 | 8.1 | 0.0014 | 2020-04-06 |
CVE-2020-10124 | 1.6 | 7.1 | 0.0257 | 2020-08-21 |
CVE-2024-27817 | 1.6 | 7.8 | 0.0015 | 2024-06-10 |
CVE-2024-46917 | 1.6 | 8.1 | 0.0004 | 2025-08-29 |
CVE-2019-10943 | 1.5 | 7.5 | 0.0011 | 2019-08-13 |
CVE-2023-32475 | 1.5 | 7.6 | 0.0001 | 2024-06-07 |
CVE-2025-48500 | 1.5 | 7.3 | 0.0001 | 2025-08-13 |
CVE-2025-15364 | 1.5 | 7.3 | 0.0006 | 2026-01-06 |
CVE-2021-26610 | 1.4 | 7.2 | 0.0016 | 2021-10-27 |
CVE-2025-48803 | 1.4 | 6.7 | 0.0042 | 2025-07-08 |
CVE-2025-48811 | 1.4 | 6.7 | 0.0042 | 2025-07-08 |
CVE-2025-65203 | 1.4 | 7.1 | 0.0003 | 2025-12-17 |
CVE-2025-10010 | 1.4 | 6.8 | 0.0002 | 2026-02-24 |
CVE-2026-42428 | 1.4 | 7.1 | 0.0002 | 2026-04-28 |
CVE-2021-28546 | 1.3 | 6.5 | 0.0040 | 2021-04-01 |
CVE-2021-38396 | 1.3 | 6.5 | 0.0002 | 2021-10-04 |
CVE-2023-28865 | 1.3 | 6.6 | 0.0032 | 2024-08-08 |
CVE-2019-19160 | 1.2 | 5.7 | 0.0032 | 2020-06-29 |
CVE-2022-2793 | 1.2 | 5.9 | 0.0002 | 2022-08-19 |