Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1327 — Vulnerability Class 16

16 vulnerabilities classified as CWE-1327. AI Chinese analysis included.

CWE-1327 represents a network configuration weakness where a service binds to the unrestricted IP address 0.0.0.0, inadvertently exposing it to all network interfaces rather than just the intended local or specific remote endpoints. This misconfiguration typically allows attackers to exploit the service from any network location, bypassing intended access controls and facilitating unauthorized remote connections, data exfiltration, or denial-of-service attacks. Developers can prevent this vulnerability by explicitly binding services to specific, necessary IP addresses, such as 127.0.0.1 for local-only access or the precise external interface IP for required remote communication. Additionally, implementing strict firewall rules and conducting regular network audits ensures that services only listen on designated addresses, thereby minimizing the attack surface and maintaining proper network segmentation and security boundaries.

MITRE CWE Description
The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely. When a server binds to the address 0.0.0.0, it allows connections from every IP address on the local machine, effectively exposing the server to every possible network. This might be much broader access than intended by the developer or administrator, who might only be expecting the server to be reachable from a single interface/network.
Common Consequences (1)
AvailabilityDoS: Amplification
Mitigations (2)
System ConfigurationAssign IP addresses that are not 0.0.0.0.
Effectiveness: High
System ConfigurationUnwanted connections to the configured server may be denied through a firewall or other packet filtering measures.
Effectiveness: High
Examples (1)
The following code snippet uses 0.0.0.0 in a Puppet script.
signingserver::instance { "nightly-key-signing-server": listenaddr     => "0.0.0.0", port           => "9100", code_tag       => "SIGNING_SERVER", }
Bad · Other
signingserver::instance { "nightly-key-signing-server": listenaddr     => "127.0.0.1", port           => "9100", code_tag       => "SIGNING_SERVER", }
Good · Other
CVE IDTitleCVSSSeverityPublished
CVE-2026-42503 Accidental binding to INADDR_ANY might lead to RCE in golang.org/x/tools/gopls — golang.org/x/tools/gopls 8.8AIHighAI2026-05-06
CVE-2026-24015 Apache IoTDB: Insecure Default Configuration Vulnerability — Apache IoTDB 9.1AICriticalAI2026-03-09
CVE-2026-28395 OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl — OpenClaw 6.5 Medium2026-03-05
CVE-2026-21528 Azure IoT Explorer Information Disclosure Vulnerability — Azure IoT Explorer 6.5 Medium2026-02-10
CVE-2025-11538 Keycloak-server: debug default bind address — keycloak 6.8 Medium2025-11-13
CVE-2025-61934 AutomationDirect Productivity Suite Binding to an Unrestricted IP Address CWE-1327 — Productivity Suite 10.0 Critical2025-10-23
CVE-2025-55322 OmniParser Remote Code Execution Vulnerability — OmniParser 7.3 High2025-09-24
CVE-2024-49384 Acronis Cyber Protect 安全漏洞 — Acronis Cyber Protect 16 9.1 -2024-10-15
CVE-2024-49383 Acronis Cyber Protect 安全漏洞 — Acronis Cyber Protect 16 9.8 -2024-10-15
CVE-2024-49382 Acronis Cyber Protect 安全漏洞 — Acronis Cyber Protect 16 9.1 -2024-10-15
CVE-2024-47176 cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source — cups-browsed 5.3 Medium2024-09-26
CVE-2024-36105 dbt allows Binding to an Unrestricted IP Address via socketsocket — dbt-core 5.3 Medium2024-05-27
CVE-2023-5398 Honeywell Experion Server 安全漏洞 — Experion Server 5.9 Medium2024-04-17
CVE-2023-41742 Acronis Agent和Acronis Cyber Protect 安全漏洞 — Acronis Agent 9.1 -2023-08-31
CVE-2023-1968 CVE-2023-1968 — iScan Control Software 10.0 Critical2023-04-28
CVE-2022-29820 Jetbrains JetBrains PyCharm 安全漏洞 — PyCharm 3.0 Low2022-04-28

Vulnerabilities classified as CWE-1327 represent 16 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.