When technical documentation is limited or lacking, products are more difficult to maintain. This indirectly affects security by making it more difficult or time-consuming to find and/or fix vulnerabilities.
When using time-limited or labor-limited third-party/in-house security consulting services (such as threat modeling, vulnerability discovery, or pentesting), insufficient documentation can force those consultants to invest unnecessary time in learning how the product is organized, instead of focusing their expertise on finding the flaws or suggesting effective mitigations.
With respect to hardware design, the lack of a formal, final manufacturer reference can make it difficult or impossible to evaluate the final product, including post-manufacture verification. One cannot ensure that design functionality or operation is within acceptable tolerances, conforms to specifications, and is free from unexpected behavior. Hardware-related documentation may include engineering artifacts such as hardware description language (HDLs), netlists, Gerber files, Bills of Materials, EDA (Electronic Design Automation) tool files, etc.
| Impact | Details |
|---|---|
|
Varies by Context; Hide Activities; Reduce Reliability; Quality Degradation; Reduce Maintainability |
Scope: Other
Without a method of verification, one cannot be sure that everything only functions as expected.
|
| Phase(s) | Mitigation |
|---|---|
|
Documentation; Architecture and Design |
Ensure that design documentation is detailed enough to allow for post-manufacturing verification.
|
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Pillar Pillar - a weakness that is the most abstract type of weakness and represents a theme for all class/base/variant weaknesses related to it. A Pillar is different from a Category as a Pillar is still technically a type of weakness that describes a mistake, while a Category represents a common characteristic used to group related things. | 710 | Improper Adherence to Coding Standards |
| ParentOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 1053 | Missing Documentation for Design |
| ParentOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 1110 | Incomplete Design Documentation |
| ParentOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 1111 | Incomplete I/O Documentation |
| ParentOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 1112 | Incomplete Documentation of Program Execution |
| ParentOf | Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. | 1118 | Insufficient Documentation of Error Handling Techniques |
| Nature | Type | ID | Name |
|---|---|---|---|
| MemberOf | Category Category - a CWE entry that contains a set of other entries that share a common characteristic. | 1195 | Manufacturing and Life Cycle Management Concerns |
| MemberOf | Category Category - a CWE entry that contains a set of other entries that share a common characteristic. | 1208 | Cross-Cutting Problems |
| Phase | Note |
|---|---|
| Architecture and Design | |
| Documentation |
Class: Not Language-Specific (Undetermined Prevalence)
Class: Not OS-Specific (Undetermined Prevalence)
Class: Not Architecture-Specific (Undetermined Prevalence)
Class: Not Technology-Specific (Undetermined Prevalence)
Class: ICS/OT (Undetermined Prevalence)
Note: this is a curated list of examples for users to understand the variety of ways in which this weakness can be introduced. It is not a complete list of all CVEs that are related to this CWE entry.
| Reference | Description |
|---|---|
| Ordinality | Description |
|---|---|
|
Indirect
|
(where the weakness is a quality issue that might indirectly make it easier to introduce security-relevant weaknesses or make them more difficult to detect)
|
| Nature | Type | ID | Name |
|---|---|---|---|
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1368 | ICS Dependencies (& Architecture): External Digital Systems |
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1371 | ICS Supply Chain: Poorly Documented or Undocumented Features |
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1375 | ICS Engineering (Construction/Deployment): Gaps in Details/Data |
| MemberOf | CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. | 1412 | Comprehensive Categorization: Poor Coding Practices |
Rationale
This entry is primarily a quality issue with no direct security implications.Comments
Look for weaknesses that are focused specifically on insecure behaviors that have more direct security implications.| Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
|---|---|---|---|
| ISA/IEC 62443 | Part 2-4 | Req SP.02.03 BR | |
| ISA/IEC 62443 | Part 2-4 | Req SP.02.03 RE(1) | |
| ISA/IEC 62443 | Part 2-4 | Req SP.03.03 RE(1) | |
| ISA/IEC 62443 | Part 4-1 | Req SG-1 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-2 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-3 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-4 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-5 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-6 | |
| ISA/IEC 62443 | Part 4-1 | Req SG-7 |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
|
2018年07月02日
(CWE 3.2, 2019年01月03日) |
CWE Content Team | MITRE | |
| Entry derived from Common Quality Enumeration (CQE) Draft 0.9. | |||
| Contributions | |||
| Contribution Date | Contributor | Organization | |
| 2021年06月11日 | Paul A. Wortman | Wells Fargo | |
| Submitted hardware-specific information about a "golden standard" that was integrated into this entry | |||
| 2023年04月25日 | "Mapping CWE to 62443" Sub-Working Group | CWE-CAPEC ICS/OT SIG | |
| Suggested mappings to ISA/IEC 62443. | |||
| Modifications | |||
| Modification Date | Modifier | Organization | |
|
2025年09月09日
(CWE 4.18, 2025年09月09日) |
CWE Content Team | MITRE | |
| updated References | |||
|
2024年02月29日
(CWE 4.14, 2024年02月29日) |
CWE Content Team | MITRE | |
| updated Mapping_Notes | |||
| 2023年10月26日 | CWE Content Team | MITRE | |
| updated Observed_Examples | |||
| 2023年06月29日 | CWE Content Team | MITRE | |
| updated Mapping_Notes, Taxonomy_Mappings | |||
| 2023年04月27日 | CWE Content Team | MITRE | |
| updated Relationships, Taxonomy_Mappings | |||
| 2023年01月31日 | CWE Content Team | MITRE | |
| updated Applicable_Platforms, Relationships | |||
| 2022年04月28日 | CWE Content Team | MITRE | |
| updated Applicable_Platforms, Common_Consequences, Description, Name, Potential_Mitigations, References, Relationships, Time_of_Introduction | |||
| 2020年02月24日 | CWE Content Team | MITRE | |
| updated Relationships | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2022年04月28日 | Incomplete Documentation | ||
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.