Cyber Posture

CWE · MITRE source

CWE-354Improper Validation of Integrity Check Value

Abstraction: Base · CVEs in our corpus: 157

The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.

Improper validation of checksums before use results in an unnecessary risk that can easily be mitigated. The protocol specification describes the algorithm used for calculating the checksum. It is then a simple matter of implementing the calculation and verifying that the calculated checksum and the received checksum match. Improper verification of the calculated checksum and the received checksum can lead to far greater consequences.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (5)AI

Control Title Family Why it addresses this CWE
SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)SCRequires validation of integrity check values on every resolution response, directly mitigating tampered or corrupted DNS data.
SC-33Transmission Preparation IntegritySCControl mandates proper validation of integrity values (checksums) on prepared data, making flawed validation of those checks ineffective for attackers.
SA-18Tamper Resistance and DetectionSAProper validation of integrity check values is required for reliable tamper detection, directly reducing undetected modification risks.
SI-7Software, Firmware, and Information IntegritySIRequires use of proper integrity verification tools, reducing the chance an incorrect check value is accepted.
SR-9Tamper Resistance and DetectionSRRequires proper validation of integrity mechanisms, directly mitigating flawed check-value handling.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2023-487954.45.90.53562023-12-18
CVE-2024-35962.99.00.19022024-07-09
CVE-2017-159942.09.80.00132017-10-29
CVE-2019-11662.05.90.13002019-10-10
CVE-2023-336682.09.80.00942023-07-12
CVE-2024-256782.09.80.00082024-02-09
CVE-2025-115432.09.80.00042025-12-22
CVE-2022-298981.99.10.00542022-05-11
CVE-2017-49611.88.80.00202017-06-13
CVE-2020-78101.88.80.00202020-08-07
CVE-2020-257581.88.80.00272020-12-15
CVE-2020-141201.88.80.00142022-04-21
CVE-2025-548871.89.10.00012025-08-08
CVE-2026-330261.89.10.00012026-03-30
CVE-2017-37601.78.10.00832017-10-17
CVE-2019-134961.78.10.00632019-11-04
CVE-2018-210701.78.40.00012020-04-08
CVE-2022-259461.78.70.00132022-05-05
CVE-2023-283861.78.60.00112023-05-22
CVE-2024-37271.78.30.00492024-05-14
CVE-2024-525501.78.00.01402024-11-13
CVE-2018-54411.67.80.00042018-01-30
CVE-2017-32241.68.20.00032018-07-24
CVE-2018-63361.67.80.00092018-12-31
CVE-2019-120971.67.80.00012019-06-03