Missing Source Correlation of Multiple Independent Data

Draft Base
Structure: Simple
Description

This vulnerability occurs when a system trusts a single source of data without verification, making it impossible to detect if that source has been tampered with or compromised by an attacker.

Extended Description

Many systems must inherently trust the data they receive, but relying on just one source creates a single point of failure. To build resilience, you should query multiple independent sources for the same critical information and compare the results. If the responses differ, the system can flag sources providing minority or conflicting data as potentially compromised. If there aren't enough consistent responses to establish a clear consensus, treat all queried sources as suspect. The required number of independent sources should scale with the criticality of the data. For high-stakes operations where incorrect data causes serious harm, increase the number of sources you cross-check. This correlation creates a simple but effective integrity check, moving security from blind trust to verified consensus.

Common Consequences 1
Scope: ConfidentialityIntegrity

Impact: Read Application DataModify Application DataGain Privileges or Assume Identity

An attacker that may be able to execute a single Person-in-the-Middle attack can subvert a check of an external oracle (e.g. the ACME protocol check for a file on a website), and thus inject an arbitrary reply to the single perspective request to the external oracle.

Potential Mitigations 2
Phase: Requirements
Design system to use a Practical Byzantine fault method, to request information from multiple sources to verify the data and report on potentially compromised information sources.
Phase: Implementation
Failure to use a Practical Byzantine fault method when requesting data. Lack of place to report potentially compromised information sources. Relying on non-independent information sources for integrity checking. Failure to report information sources that respond in the minority to incident response procedures.
References 3
Validation Vulnerabilities
moparisthebest
05-06-2015
ID: REF-1125
Multi-Perspective Validation Improves Domain Validation Security
Josh Aas, Daniel McCarney, and Roland Shoemaker
19-02-2020
ID: REF-1126
Practical Byzantine Fault Tolerance and Proactive Recovery
Miguel Castro and Barbara Liskov
04-11-2002
ID: REF-1127
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Not Technology-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Operation