Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-129 (对数组索引的验证不恰当) — Vulnerability Class 182

182 vulnerabilities classified as CWE-129 (对数组索引的验证不恰当). AI Chinese analysis included.

CWE-129 represents an improper validation of array index weakness where software fails to verify that untrusted input falls within the valid bounds of an array. This vulnerability typically allows attackers to exploit the flaw by supplying malicious values that cause the application to read or write memory outside the intended array boundaries. Such out-of-bounds access can lead to critical security breaches, including data corruption, denial of service, or arbitrary code execution, depending on the memory layout and context. To prevent this issue, developers must implement rigorous input validation checks before using any external data as an array index. This involves ensuring that indices are strictly greater than or equal to zero and less than the array’s defined length. Additionally, utilizing safe programming languages with automatic bounds checking or employing static analysis tools can help identify and mitigate these risks during the development lifecycle.

MITRE CWE Description
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Common Consequences (5)
Integrity, AvailabilityDoS: Crash, Exit, or Restart
Use of an index that is outside the bounds of an array will very likely result in the corruption of relevant memory and perhaps instructions, leading to a crash, if the values are outside of the valid memory area.
IntegrityModify Memory
If the memory corrupted is data, rather than instructions, the system will continue to function with improper values.
Confidentiality, IntegrityModify Memory, Read Memory
Use of an index that is outside the bounds of an array can also trigger out-of-bounds read or write operations, or operations on the wrong objects; i.e., "buffer overflows" are not always the result. This may result in the exposure or modification of sensitive data.
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If the memory accessible by the attacker can be effectively controlled, it may be possible to execute arbitrary code, as with a standard buffer overflow and possibly without the use of large inputs if a precise index can be controlled.
Integrity, Availability, ConfidentialityDoS: Crash, Exit, or Restart, Execute Unauthorized Code or Commands, Read Memory, Modify Memory
A single fault could allow either an overflow (CWE-788) or underflow (CWE-786) of the array index. What happens next will depend on the type of operation being performed out of bounds, but can expose sensitive information, cause a system crash, or possibly lead to arbitrary code execution.
Mitigations (5)
Architecture and DesignUse an input validation framework such as Struts or the OWASP ESAPI Validation API. Note that using a framework does not automatically address all input validation problems; be mindful of weaknesses that could arise from misusing the framework itself (CWE-1173).
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Even though clien…
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, Ada allows the programmer to constrain the values of a variable and languages such as Java and Ruby will allow the programmer to handle exceptions when an out-of-bounds index is accessed.
Operation, Build and CompilationRun or compile the software using features or extensions that randomly arrange the positions of a program's executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code. Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported…
Effectiveness: Defense in Depth
OperationUse a CPU and operating system that offers Data Execution Protection (using hardware NX or XD bits) or the equivalent techniques that simulate this feature in software, such as PaX [REF-60] [REF-61]. These techniques ensure that any instruction executed is exclusively at a memory address that is part of the code segment. For more information on these techniques see D3-PSEP (Process Segment Executi…
Effectiveness: Defense in Depth
Examples (2)
In the code snippet below, an untrusted integer value is used to reference an object in an array.
public String getValue(int index) { return array[index]; }
Bad · Java
The following example takes a user-supplied value to allocate an array of objects and then operates on the array.
private void buildList ( int untrustedListSize ){ if ( 0 > untrustedListSize ){ die("Negative value supplied for list size, die evil hacker!"); } Widget[] list = new Widget [ untrustedListSize ]; list[0] = new Widget(); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2025-47361 Improper Validation of Array Index in Automotive Software platform based on QNX — Snapdragon 7.8 High2025-11-04
CVE-2025-47352 Improper Validation of Array Index in Audio — Snapdragon 7.8 High2025-11-04
CVE-2025-27034 Improper Validation of Array Index in Multi-Mode Call Processor — Snapdragon 9.8 Critical2025-09-24
CVE-2025-23338 NVIDIA CUDA Toolkit 输入验证错误漏洞 — NVIDIA CUDA Toolkit 3.3 Low2025-09-24
CVE-2024-21970 AMD Embedded Processors和AMD Client Processor 安全漏洞 — AMD Ryzen™ Threadripper™ 3000 Processors 4.4 Medium2025-09-06
CVE-2023-31306 AMD Graphics Driver 安全漏洞 — AMD Radeon™ RX 5000 Series Graphics Products 3.3 Low2025-09-06
CVE-2025-27075 Improper Validation of Array Index in Bluetooth HOST — Snapdragon 7.8 High2025-08-06
CVE-2025-27067 Improper Validation of Array Index in DSP Service — Snapdragon 7.8 High2025-08-06
CVE-2025-54650 Huawei HarmonyOS 安全漏洞 — HarmonyOS 4.2 Medium2025-08-06
CVE-2025-54645 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.0 Medium2025-08-06
CVE-2025-54610 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.4 Medium2025-08-06
CVE-2025-23278 NVIDIA GPU Display Driver 输入验证错误漏洞 — GPU Display Drivers 7.1 High2025-08-02
CVE-2024-53009 Improper Validation of Array Index in Automotive Autonomy — Snapdragon 5.3 Medium2025-07-08
CVE-2024-35164 Apache Guacamole: Improper input validation of console codes — Apache Guacamole 6.8 Medium2025-07-02
CVE-2025-5868 RT-Thread lwp_syscall.c sys_thread_sigprocmask array index — RT-Thread 8.0 High2025-06-09
CVE-2025-5866 RT-Thread lwp_syscall.c sys_sigprocmask array index — RT-Thread 8.0 High2025-06-09
CVE-2025-48075 Fiber panics when fiber.Ctx.BodyParser parses invalid range index — fiber 7.5AIHighAI2025-05-22
CVE-2025-1975 Improper Validation of Array Index in ollama/ollama — ollama/ollama 7.5AIHighAI2025-05-16
CVE-2024-45578 Improper Validation of Array Index in Camera Driver — Snapdragon 7.8 High2025-05-06
CVE-2024-45576 Improper Validation of Array Index in Camera Driver — Snapdragon 7.8 High2025-05-06
CVE-2024-45574 Improper Validation of Array Index in Camera Driver — Snapdragon 7.8 High2025-05-06
CVE-2025-21447 Improper Validation of Array Index in Computer Vision — Snapdragon 7.8 High2025-04-07
CVE-2025-21423 Improper Validation of Array Index in Display — Snapdragon 7.8 High2025-04-07
CVE-2025-30077 onos-lib-go 输入验证错误漏洞 — onos-lib-go 6.2 Medium2025-03-16
CVE-2024-53014 Improper Validation of Array Index in Audio — Snapdragon 7.8 High2025-03-03
CVE-2024-49836 Improper Validation of Array Index in Camera — Snapdragon 7.8 High2025-03-03
CVE-2024-49843 Improper Validation of Array Index in Graphics_Linux — Snapdragon 7.8 High2025-02-03
CVE-2024-49837 Improper Validation of Array Index in Automotive OS Platform — Snapdragon 7.8 High2025-02-03
CVE-2024-49834 Improper Validation of Array Index in Camera — Snapdragon 7.8 High2025-02-03
CVE-2024-49833 Improper Validation of Array Index in Camera — Snapdragon 7.8 High2025-02-03

Vulnerabilities classified as CWE-129 (对数组索引的验证不恰当) represent 182 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.