This vulnerability occurs when an application stores or sends sensitive information without first encrypting it, leaving the data exposed.

Sensitive data like passwords, financial details, personal identification numbers, or authentication tokens must be encrypted both at rest (in databases, logs, or files) and in transit (over networks). When developers skip this step, any attacker who gains access to the storage or can intercept the network traffic can read the information directly, leading to immediate data breaches, identity theft, or system compromise. Preventing this requires a proactive security mindset. Always use strong, standard encryption algorithms (like AES for storage and TLS for transmission) and manage encryption keys securely. Treat any data that could harm users or your organization if exposed as 'sensitive' and encrypt it by default, rather than trying to decide case-by-case. Regularly audit your code and configurations to ensure no critical data flows or persists in plaintext.
Impact: Read Application Data
If the application does not use a secure channel, such as SSL, to exchange sensitive information, it is possible for an attacker with access to the network traffic to sniff packets from the connection and uncover the data. This attack is not technically difficult, but does require physical access to some portion of the network over which the sensitive data travels. This access is usually somewhere near where the user is connected to the network (such as a colleague on the company network) but can be anywhere along the path from the user to the end server.
Impact: Modify Application Data
Omitting the use of encryption in any program which transfers data over a network of any kind should be considered on par with delivering the data sent to each user on the local networks of both the sender and receiver. Worse, this omission allows for the injection of data into a stream of communication between two parties -- with no means for the victims to separate valid data from invalid. In this day of widespread network attacks and password collection sniffers, it is an unnecessary risk to omit encryption from the design of any system which might benefit from it.
Strategy: Libraries or Frameworks
Strategy: Separation of Privilege
Strategy: Attack Surface Reduction
Effectiveness: Defense in Depth
phpcjava
//...* }
High