Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-362 (使用共享资源的并发执行不恰当同步问题(竞争条件)) — Vulnerability Class 422

422 vulnerabilities classified as CWE-362 (使用共享资源的并发执行不恰当同步问题(竞争条件)). AI Chinese analysis included.

CWE-362 represents a concurrency weakness where multiple threads access a shared resource without proper synchronization, creating a timing window for unauthorized modification. Attackers typically exploit this by manipulating execution order to trigger unpredictable behavior, such as privilege escalation or data corruption, by interleaving operations to bypass security checks or overwrite critical values. Developers mitigate this risk by implementing robust synchronization mechanisms, including mutexes, semaphores, or atomic operations, to ensure exclusive access during critical sections. Additionally, adopting thread-safe design patterns and minimizing shared state can significantly reduce the attack surface. By rigorously testing concurrent code paths and enforcing strict access controls, engineers prevent race conditions, ensuring application integrity and stability under high-concurrency scenarios.

MITRE CWE Description
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. A race condition occurs within concurrent environments, and it is effectively a property of a code sequence. Depending on the context, a code sequence may be in the form of a function call, a small number of instructions, a series of program invocations, etc. A race condition violates these properties, which are closely related: Exclusivity - the code sequence is given exclusive access to the shared resource, i.e., no other code sequence can modify properties of the shared resource before the original sequence has completed execution. Atomicity - the code sequence is behaviorally atomic, i.e., no other thread or process can concurrently execute the same sequence of instructions (or a subset) against the same resource. A race condition exists when an "interfering code sequence" can still access the shared resource, violating exclusivity. The interfering code sequence could be "trusted" or "untrusted." A trusted interfering code sequence occurs within the product; it cannot be modified by the attacker, and it can only be invoked indirectly. An untrusted interfering code sequence can be authored directly by the attacker, and typically it is external to the vulnerable product.
Common Consequences (4)
AvailabilityDoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
When a race condition makes it possible to bypass a resource cleanup routine or trigger multiple initialization routines, it may lead to resource exhaustion.
AvailabilityDoS: Crash, Exit, or Restart, DoS: Instability
When a race condition allows multiple control flows to access a resource simultaneously, it might lead the product(s) into unexpected states, possibly resulting in a crash.
Confidentiality, IntegrityRead Files or Directories, Read Application Data
When a race condition is combined with predictable resource names and loose permissions, it may be possible for an attacker to overwrite or access confidential data (CWE-59).
Access ControlExecute Unauthorized Code or Commands, Gain Privileges or Assume Identity, Bypass Protection Mechanism
This can have security implications when the expected synchronization is in security-critical code, such as recording whether a user is authenticated or modifying important state information that should not be influenced by an outsider.
Mitigations (5)
Architecture and DesignIn languages that support it, use synchronization primitives. Only wrap these around critical code to minimize the impact on performance.
Architecture and DesignUse thread-safe capabilities such as the data access abstraction in Spring.
Architecture and DesignMinimize the usage of shared resources in order to remove as much complexity as possible from the control flow and to reduce the likelihood of unexpected conditions occurring. Additionally, this will minimize the amount of synchronization necessary and may even help to reduce the likelihood of a denial of service where an attacker may be able to repeatedly trigger a critical section (CWE-400).
ImplementationWhen using multithreading and operating on shared variables, only use thread-safe functions.
ImplementationUse atomic operations on shared variables. Be wary of innocent-looking constructs such as "x++". This may appear atomic at the code layer, but it is actually non-atomic at the instruction layer, since it involves a read, followed by a computation, followed by a write.
Examples (2)
This code could be used in an e-commerce application that supports transfers between accounts. It takes the total amount of the transfer, sends it to the new account, and deducts the amount from the original account.
$transfer_amount = GetTransferAmount(); $balance = GetBalanceFromDatabase(); if ($transfer_amount < 0) { FatalError("Bad Transfer Amount"); } $newbalance = $balance - $transfer_amount; if (($balance - $transfer_amount) < 0) { FatalError("Insufficient Funds"); } SendNewBalanceToDatabase($newbalance); NotifyUser("Transfer of $transfer_amount succeeded."); NotifyUser("New balance: $newbalance");
Bad · Perl
In the following pseudocode, the attacker makes two simultaneous calls of the program, CALLER-1 and CALLER-2. Both callers are for the same user account. CALLER-1 (the attacker) is associated with PROGRAM-1 (the instance that handles CALLER-1). CALLER-2 is associated with PROGRAM-2. CALLER-1 makes a transfer request of 80.00. PROGRAM-1 calls GetBalanceFromDatabase and sets $balance to 100.00 PROGRAM-1 calculates $newbalance as 20.00, then calls SendNewBalanceToDatabase(). Due to high server load, the PROGRAM-1 call to SendNewBalanceToDatabase() encounters a delay. CALLER-2 makes a transfer req
Attack · Other
The following function attempts to acquire a lock in order to perform operations on a shared resource.
void f(pthread_mutex_t *mutex) { pthread_mutex_lock(mutex); /* access shared resource */ pthread_mutex_unlock(mutex); }
Bad · C
int f(pthread_mutex_t *mutex) { int result; result = pthread_mutex_lock(mutex); if (0 != result) return result; /* access shared resource */ return pthread_mutex_unlock(mutex); }
Good · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-20919 Windows SMB Server Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.5 High2026-01-13
CVE-2026-20869 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-01-13
CVE-2026-20836 DirectX Graphics Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-01-13
CVE-2026-20826 Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability — Windows 10 Version 1607 7.8 High2026-01-13
CVE-2026-20815 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability — Windows 11 Version 24H2 7.0 High2026-01-13
CVE-2026-20814 DirectX Graphics Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-01-13
CVE-2026-20808 Windows File Explorer Elevation of Privilege Vulnerability — Windows 11 Version 24H2 7.0 High2026-01-13
CVE-2026-21697 axios4go's Race Condition in Shared HTTP Client Allows Proxy Configuration Leak — axios4go 8.1 -2026-01-07
CVE-2025-15244 PHPEMS Purchase Request race condition — PHPEMS 3.7 Low2025-12-30
CVE-2025-15242 PHPEMS Coupon race condition — PHPEMS 3.1 Low2025-12-30
CVE-2025-15116 OpenCart Single-Use Coupon race condition — OpenCart 3.7 Low2025-12-28
CVE-2025-33235 NVIDIA Resiliency Extension 竞争条件问题漏洞 — Resiliency Extension 7.8 High2025-12-16
CVE-2025-13231 Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Server-Side Request Forgery via Race Condition — Fancy Product Designer 6.5 Medium2025-12-16
CVE-2025-66446 MaxKB has a Python sandbox LD_PRELOAD bypass — MaxKB 8.8 High2025-12-11
CVE-2025-66419 MaxKB vulnerable to privilege escalation through sandbox bypass — MaxKB 8.8 High2025-12-11
CVE-2025-67505 Race condition in the Okta Java SDK — okta-sdk-java 8.4 High2025-12-10
CVE-2025-64661 Windows Shell Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.8 High2025-12-09
CVE-2025-64658 Windows File Explorer Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.5 High2025-12-09
CVE-2025-62469 Microsoft Brokering File System Elevation of Privilege Vulnerability — Windows 11 Version 24H2 7.0 High2025-12-09
CVE-2025-66328 Huawei HarmonyOS 安全漏洞 — HarmonyOS 8.4 High2025-12-08
CVE-2025-66327 Huawei HarmonyOS 安全漏洞 — HarmonyOS 7.1 High2025-12-08
CVE-2025-66322 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.1 Medium2025-12-08
CVE-2025-66321 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.1 Medium2025-12-08
CVE-2025-66320 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.1 Medium2025-12-08
CVE-2025-13721 Google Chrome 安全漏洞 — Chrome 7.5AIHighAI2025-12-02
CVE-2025-20765 MediaTek Chipsets 安全漏洞 — MT2718, MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8113, MT8115, MT8139, MT8163, MT8168, MT8169, MT8183, MT8186, MT8188, MT8512, MT8516, MT8518, MT8519, MT8532, MT8676, MT8678, MT8695, MT8696, MT8698 4.1AIMediumAI2025-12-02
CVE-2025-64313 Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.3 Medium2025-11-28
CVE-2025-58316 Huawei HarmonyOS 安全漏洞 — HarmonyOS 7.3 High2025-11-28
CVE-2025-58303 Huawei HarmonyOS 安全漏洞 — HarmonyOS 8.4 High2025-11-28
CVE-2025-12472 Remote Code Execution in Looker due to Improperly Validated Directory Deletion — Looker 7.5AIHighAI2025-11-19

Vulnerabilities classified as CWE-362 (使用共享资源的并发执行不恰当同步问题(竞争条件)) represent 422 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.