CWE-291 信任自主报告的IP地址 类弱点 9 条 CVE 漏洞汇总,含 AI 中文分析。
CWE-291 指依赖 IP 地址进行身份验证的安全缺陷。由于 IP 地址极易被伪造,攻击者可通过欺骗源 IP 发起请求,并配合网络嗅探技术截获响应包以完成认证绕过。这种机制缺乏强身份确认,存在严重信任风险。开发者应避免仅凭 IP 验证身份,需结合多因素认证、令牌或证书等更可靠的机制,确保访问控制的严谨性与安全性。
sd = socket(AF_INET, SOCK_DGRAM, 0); serv.sin_family = AF_INET; serv.sin_addr.s_addr = htonl(INADDR_ANY); servr.sin_port = htons(1008); bind(sd, (struct sockaddr *) & serv, sizeof(serv)); while (1) { memset(msg, 0x0, MAX_MSG); clilen = sizeof(cli); if (inet_ntoa(cli.sin_addr)==getTrustedAddress()) { n = recvfrom(sd, msg, MAX_MSG, 0, (struct sockaddr *) & cli, &clilen); } }while(true) { DatagramPacket rp=new DatagramPacket(rData,rData.length); outSock.receive(rp); String in = new String(p.getData(),0, rp.getLength()); InetAddress clientIPAddress = rp.getAddress(); int port = rp.getPort(); if (isTrustedAddress(clientIPAddress) & secretKey.equals(in)) { out = secret.getBytes(); DatagramPacket sp =new DatagramPacket(out,out.length, IPAddress, port); outSock.send(sp); } }| CVE ID | 标题 | CVSS | 风险等级 | Published |
|---|---|---|---|---|
| CVE-2026-3690 | OpenClaw 安全漏洞 — OpenClaw | 9.8AI | CriticalAI | 2026-04-11 |
| CVE-2026-4252 | Tenda AC8 安全漏洞 — AC8 | 9.8 | Critical | 2026-03-16 |
| CVE-2025-66602 | Yokogawa FAST/TOOLS 安全漏洞 — FAST/TOOLS | 9.8AI | CriticalAI | 2026-02-09 |
| CVE-2025-59101 | Dormakaba Access Manager 安全漏洞 — Access Manager 92xx-k5 | 9.8AI | CriticalAI | 2026-01-26 |
| CVE-2025-34202 | Vasion Print和Vasion Print Virtual Appliance Host 安全漏洞 — Print Virtual Appliance Host | 7.1 | - | 2025-09-19 |
| CVE-2024-23309 | LevelOne WBR-6012 安全漏洞 — WBR-6012 | 9.0 | Critical | 2024-10-30 |
| CVE-2024-32765 | QNAP Systems QTS和QNAP Systems QuTS hero 安全漏洞 — QTS | 4.2 | Medium | 2024-08-09 |
| CVE-2023-7211 | Uniway Router 安全漏洞 — Router | 5.6 | Medium | 2024-01-07 |
| CVE-2023-35906 | IBM Aspera 数据伪造问题漏洞 — Aspera Faspex | 5.3 | Medium | 2023-09-05 |
CWE-291(信任自主报告的IP地址) 是常见的弱点类别,本平台收录该类弱点关联的 9 条 CVE 漏洞。