Cyber Posture

CWE · MITRE source

CWE-656Reliance on Security Through Obscurity

Abstraction: Class · CVEs in our corpus: 11

The product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.

This reliance on "security through obscurity" can produce resultant weaknesses if an attacker is able to reverse engineer the inner workings of the mechanism. Note that obscurity can be one small part of defense in depth, since it can create more work for an attacker; however, it is a significant risk if used as the primary means of protection.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2026-423631.99.30.00032026-04-27
CVE-2026-71611.99.30.00042026-05-04
CVE-2020-102841.89.10.00462020-07-15
CVE-2020-102861.88.80.00192020-07-15
CVE-2024-91381.57.20.00182025-01-03
CVE-2020-102771.36.40.00062020-06-24
CVE-2024-52440.84.20.00082024-05-23
CVE-2025-259830.73.40.00162025-04-18
CVE-2024-122970.00.00.00172025-01-15
CVE-2025-70200.00.00.00032025-08-09
CVE-2025-590930.00.00.00022026-01-26