Improper Verification of Cryptographic Signature
The software does not verify, or incorrectly verifies, the cryptographic signature for data. The weakness is introduced during Architecture and Design, Implementation stages.