Skip to content

MASWE-0022: Predictable Initialization Vectors (IVs)

Content in BETA

This content is in beta and still under active development, so it is subject to change any time (e.g. structure, IDs, content, URLs, etc.).

Send Feedback

Draft Weakness

This weakness hasn't been created yet and it's in draft. But you can check its status or start working on it yourself. If the issue has not yet been assigned, you can request to be assigned to it and submit a PR with the new content for that weakness by following our guidelines.

Check our GitHub Issues for MASWE-0022

Initial Description or Hints

The use of predictable IVs (hardcoded, null, reused) in a security sensitive context can weaken data encryption strength and potentially compromise confidentiality.

Relevant Topics

  • not use the IvParameterSpec.class anymore for GCM, use the GCMParameterSpec.class instead (Android)
  • Hardcoded IVs
  • Null IVs
  • Reused IVs

References

MASTG v1 Coverage