SlideShare a Scribd company logo
3
Most read
4
Most read
7
Most read
Common Weakness 
Enumeration 
Aung Thu Rha Hein (g5536871)
Content 
■ What is CWE? 
■ CWE Process 
■ CWE Lists 
■ CWE Overviews 
■ CWE Requirements 
■ Products & Services 
■ References
What is CWE? 
■ CWE is an extended project of CVE by MITRE 
■ list of software weakness for developers and security 
practitioners 
■ a common language for describing software security 
weaknesses 
■ a standard measurement for software security tools 
■ a common baseline standard for weakness 
identification, mitigation, and prevention efforts
CWE Process 
■ CVE provides real-world vulnerabilities 
■ CWE provides specific and concise definition of 
common software weakness 
■ working to map each CWE list with specific CVE-IDs 
■ 3 organizational structures for CWE elements: 
o lowest level for tool vendors & researchers 
o mid level for security practitioners 
o highest level for software practitioners & other stakeholders
CWE Lists 
■ latest version - 2.6 
o 943 CWEs 
● 31 views 
● 187 categories 
● 717 weakness 
● 8 compound elements 
■ it also provides filter for different users 
■ the lists are community initiative
CWE Lists/2 
■ CWEs are in hierarchical structure
CWE 
Lists/3
CWE Overviews 
■ 4 useful overviews (Total,Views,Categories,Weakness, Compound elements) 
o CWE-699: Development concepts (754, 4, 65, 680, 5) 
o CWE-1000: Research concepts ( 721, 0, 9, 704, 8) 
o CWE-2000: Comprehensive CWE Dictionary 
o PDFs with Graphical Depictions of CWE 
■ Views can be slices or graphs 
■ Compound Elements are entries that closely associates 
■ Chains are entries that has cause/effect on another
CWE Requirements 
*4 out of6 requirements 
CWE Searchable users may search security elements using CWE identifiers 
CWE Output 
security elements presented to users includes, or allows users to obtain, associated 
CWE identifiers 
Mapping Accuracy security elements accurately link to the appropriate CWE identifiers 
CWE Documentation 
capability's documentation describes CWE, CWE compatibility, and how CWE-related 
functionality in the capability is used 
CWE Coverage 
for CWE-Compatibility and CWE-Effectiveness, the capability's documentation 
explicitly lists the CWE-IDs that the capability claims coverage and effectiveness 
against locating in software 
CWE Test Results 
for CWE-Effectiveness, test results from the capability showing the results of 
assessing software for the CWEs are posted on the CWE Web site
Products & Services 
■ 10 organizations that hold CWE compatible status 
o Fascoo (Sparrow) 
o CXSecurity (WLB) 
o GrammarTech (CodeSonar) 
o High-Tech Bridge (HTB SA,ImmuniWeb) 
o IBM Security Systems (IBM Security AppScan Standard) 
o Klockwork (Klokwork Insight) 
o HP 
o NIST (SARD) 
o Security Database (Security Database Web Services) 
o Veracode (Veracode Analysis)
References 
■ http://cwe.mitre.org/ 
■ https://en.wikipedia.org/wiki/Common_Weakness_Enu 
meration 
■ https://nvd.nist.gov/cwe.cfm

More Related Content

PPTX
INFORMATION SECURITY
PPTX
Nessus-Vulnerability Tester
PDF
Information Security Risk Management
PPTX
Types of Malware (CEH v11)
PDF
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
PPTX
User authentication
 
PDF
VULNERABILITY ( CYBER SECURITY )
INFORMATION SECURITY
Nessus-Vulnerability Tester
Information Security Risk Management
Types of Malware (CEH v11)
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
User authentication
 
VULNERABILITY ( CYBER SECURITY )

What's hot (20)

PPT
Information security
PPTX
Authentication
PDF
Malware classification and detection
PPT
Application Threat Modeling
PPTX
Introduction to Information Security
PPTX
Malware analysis
PPTX
Final spam-e-mail-detection
PPTX
Introduction to Malware Analysis
PDF
Public key Infrastructure (PKI)
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Incident response process
PPTX
IT Security
PPTX
Network scanning
PPTX
Cybercrime and Security
PPTX
Mobile Forensics
PPTX
Cybersecurity Awareness Training
PDF
Network forensics
ODP
Email security
PPTX
pda forensics
PPTX
Basics of Denial of Service Attacks
Information security
Authentication
Malware classification and detection
Application Threat Modeling
Introduction to Information Security
Malware analysis
Final spam-e-mail-detection
Introduction to Malware Analysis
Public key Infrastructure (PKI)
Network security (vulnerabilities, threats, and attacks)
Incident response process
IT Security
Network scanning
Cybercrime and Security
Mobile Forensics
Cybersecurity Awareness Training
Network forensics
Email security
pda forensics
Basics of Denial of Service Attacks
Ad

Similar to Introduction to Common Weakness Enumeration (CWE) (14)

PPT
Common Vulnerabilities and Exposures details
PPTX
Top 8 CWE (Common Weakness Enumeration).pptx
PDF
How the CC Harmonizes with Secure Software Development Lifecycle
PPTX
Classification of vulnerabilities
PPSX
Ids 004 cve
PPT
pptAJECGYW9qopptAJECGYW9qopptAJECGYW9qopptAJECGYW9qo.ppt
PPTX
Reverse Engineering Project
PDF
Secure Coding and Threat Modeling
PDF
Life of a CVE
PPTX
How to assign a CVE to yourself?
PPTX
Common Sofftware Errors
PPTX
Cm5 secure code_training_1day_system configuration
PPTX
AusCERT 2016: CVE and alternatives
PPTX
Tracking the Progress of an SDL Program: Lessons from the Gym
Common Vulnerabilities and Exposures details
Top 8 CWE (Common Weakness Enumeration).pptx
How the CC Harmonizes with Secure Software Development Lifecycle
Classification of vulnerabilities
Ids 004 cve
pptAJECGYW9qopptAJECGYW9qopptAJECGYW9qopptAJECGYW9qo.ppt
Reverse Engineering Project
Secure Coding and Threat Modeling
Life of a CVE
How to assign a CVE to yourself?
Common Sofftware Errors
Cm5 secure code_training_1day_system configuration
AusCERT 2016: CVE and alternatives
Tracking the Progress of an SDL Program: Lessons from the Gym
Ad

More from Aung Thu Rha Hein (19)

PPTX
Writing with ease
PDF
Bioinformatics for Computer Scientists
PPTX
Analysis of hybrid image with FFT (Fast Fourier Transform)
PDF
Private Browsing: A Window of Forensic Opportunity
PDF
Network switching
PDF
Digital Forensic: Brief Intro & Research Challenge
PDF
Survey & Review of Digital Forensic
PPTX
Partitioned Based Regression Verification
PDF
CRAXweb: Automatic Exploit Generation for Web Applications
PPTX
Botnets 101
PPTX
Session initiation protocol
PPTX
TPC-H in MongoDB
PPTX
Web application security: Threats & Countermeasures
PPTX
Cloud computing security
PPTX
Can the elephants handle the no sql onslaught
PPTX
Fuzzy logic based students’ learning assessment
PPTX
Link state routing protocol
PPTX
Chat bot analysis
PDF
Data mining & column stores
Writing with ease
Bioinformatics for Computer Scientists
Analysis of hybrid image with FFT (Fast Fourier Transform)
Private Browsing: A Window of Forensic Opportunity
Network switching
Digital Forensic: Brief Intro & Research Challenge
Survey & Review of Digital Forensic
Partitioned Based Regression Verification
CRAXweb: Automatic Exploit Generation for Web Applications
Botnets 101
Session initiation protocol
TPC-H in MongoDB
Web application security: Threats & Countermeasures
Cloud computing security
Can the elephants handle the no sql onslaught
Fuzzy logic based students’ learning assessment
Link state routing protocol
Chat bot analysis
Data mining & column stores

Recently uploaded (20)

PDF
Digital Logic Computer Design lecture notes
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Welding lecture in detail for understanding
PDF
composite construction of structures.pdf
PPTX
web development for engineering and engineering
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Internet of Things (IOT) - A guide to understanding
Digital Logic Computer Design lecture notes
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
573137875-Attendance-Management-System-original
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lecture Notes Electrical Wiring System Components
Welding lecture in detail for understanding
composite construction of structures.pdf
web development for engineering and engineering
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Embodied AI: Ushering in the Next Era of Intelligent Systems
Internet of Things (IOT) - A guide to understanding

Introduction to Common Weakness Enumeration (CWE)

  • 1. Common Weakness Enumeration Aung Thu Rha Hein (g5536871)
  • 2. Content ■ What is CWE? ■ CWE Process ■ CWE Lists ■ CWE Overviews ■ CWE Requirements ■ Products & Services ■ References
  • 3. What is CWE? ■ CWE is an extended project of CVE by MITRE ■ list of software weakness for developers and security practitioners ■ a common language for describing software security weaknesses ■ a standard measurement for software security tools ■ a common baseline standard for weakness identification, mitigation, and prevention efforts
  • 4. CWE Process ■ CVE provides real-world vulnerabilities ■ CWE provides specific and concise definition of common software weakness ■ working to map each CWE list with specific CVE-IDs ■ 3 organizational structures for CWE elements: o lowest level for tool vendors & researchers o mid level for security practitioners o highest level for software practitioners & other stakeholders
  • 5. CWE Lists ■ latest version - 2.6 o 943 CWEs ● 31 views ● 187 categories ● 717 weakness ● 8 compound elements ■ it also provides filter for different users ■ the lists are community initiative
  • 6. CWE Lists/2 ■ CWEs are in hierarchical structure
  • 8. CWE Overviews ■ 4 useful overviews (Total,Views,Categories,Weakness, Compound elements) o CWE-699: Development concepts (754, 4, 65, 680, 5) o CWE-1000: Research concepts ( 721, 0, 9, 704, 8) o CWE-2000: Comprehensive CWE Dictionary o PDFs with Graphical Depictions of CWE ■ Views can be slices or graphs ■ Compound Elements are entries that closely associates ■ Chains are entries that has cause/effect on another
  • 9. CWE Requirements *4 out of6 requirements CWE Searchable users may search security elements using CWE identifiers CWE Output security elements presented to users includes, or allows users to obtain, associated CWE identifiers Mapping Accuracy security elements accurately link to the appropriate CWE identifiers CWE Documentation capability's documentation describes CWE, CWE compatibility, and how CWE-related functionality in the capability is used CWE Coverage for CWE-Compatibility and CWE-Effectiveness, the capability's documentation explicitly lists the CWE-IDs that the capability claims coverage and effectiveness against locating in software CWE Test Results for CWE-Effectiveness, test results from the capability showing the results of assessing software for the CWEs are posted on the CWE Web site
  • 10. Products & Services ■ 10 organizations that hold CWE compatible status o Fascoo (Sparrow) o CXSecurity (WLB) o GrammarTech (CodeSonar) o High-Tech Bridge (HTB SA,ImmuniWeb) o IBM Security Systems (IBM Security AppScan Standard) o Klockwork (Klokwork Insight) o HP o NIST (SARD) o Security Database (Security Database Web Services) o Veracode (Veracode Analysis)
  • 11. References ■ http://cwe.mitre.org/ ■ https://en.wikipedia.org/wiki/Common_Weakness_Enu meration ■ https://nvd.nist.gov/cwe.cfm

Editor's Notes

  • #4: CWE is a security measurement standard by classifying and categorizing vulnerabilities, attacks, faults, and other concepts to help define common software weaknesses.
  • #5: we continue to leverage as many sources and examples as we can from the CWE community other interested parties, to develop the specific and succinct definitions of the CWE List elements and classification tree structures. (1) the lowest level consists of the full CWE List (hundreds of nodes) that is primarily applicable to tool vendors and detailed research efforts; (2) a middle tier consists of descriptive affinity groupings of individual CWEs (25-60 nodes) useful to software security and software development practitioners; and (3) a more easily understood top level consisting of high-level groupings of the middle-tier nodes (5-15 nodes) to define strategic classes of vulnerabilities and which is useful for high-level discourse among software practitioners, business people, tool vendors, researchers
  • #6: 2.6 published Feb 2014 full CWEs include View a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries). Category a CWE entry that contains a set of other entries that share a common characteristic. Class Weakness a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More general than a Base weakness. Base Weakness a weakness that is described in an abstract fashion, but with sufficient details to infer specific methods for detection and prevention. More general than a Variant weakness, but more specific than a Class weakness. Compound Element an Entry that closely associates two or more CWE entries. The CWE team's research has shown that vulnerabilities often can be described in terms of the interaction or co-occurrence of two or more weaknesses. In CWE 1.0, the only types of compound elements are Chains and Composites, although other types might be defined in later versions.