Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1420

1420 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2020-8557 Kubernetes node disk Denial of Service by writing to container /etc/hosts — Kubernetes 5.5 Medium2020-07-23
CVE-2020-3372 Cisco SD-WAN vManage Software Denial of Service Vulnerability — Cisco SD-WAN vManage 6.5 Medium2020-07-16
CVE-2020-15101 Nested directory structure can lead to Uncontrolled Resource Consumption in freewvs — freewvs 2.8 Low2020-07-14
CVE-2020-15100 Uncontrolled Resource Consumption in freewvs — freewvs 2.8 Low2020-07-14
CVE-2020-7584 SIMATIC S7-200 SMART SR CPU和ST CPU 资源管理错误漏洞 — SIMATIC S7-200 SMART CPU family 7.5 -2020-07-14
CVE-2020-7587 Siemens Opcenter 资源管理错误漏洞 — Opcenter Execution Discrete 8.3 -2020-07-14
CVE-2020-8185 Rails 资源管理错误漏洞 — https://github.com/rails/rails 6.5 -2020-07-02
CVE-2020-7507 Schneider Electric Easergy T300 资源管理错误漏洞 — Easergy T300 (Firmware version 1.5.2 and older) 6.5 -2020-06-16
CVE-2020-11090 Uncontrolled Resource Consumption in Indy Node — Indy Node 7.5 High2020-06-11
CVE-2020-3203 Cisco IOS XE Software Catalyst 9800 Series Wireless Controllers Denial of Service Vulnerability — Cisco IOS XE Software 16.1.1 8.6 -2020-06-03
CVE-2019-11048 Temporary files are not cleaned after OOM when parsing HTTP request data — PHP 5.3 Medium2020-05-20
CVE-2020-3306 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DHCP Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2020-05-06
CVE-2020-3305 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software BGP Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2020-05-06
CVE-2020-3255 Cisco Firepower Threat Defense Software Packet Flood Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 8.6 -2020-05-06
CVE-2020-3254 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2020-05-06
CVE-2020-3196 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 8.6 -2020-05-06
CVE-2020-3195 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF Packets Processing Memory Leak Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2020-05-06
CVE-2020-3189 Cisco Firepower Threat Defense Software VPN System Logging Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 8.6 -2020-05-06
CVE-2020-1722 Red Hat IPA 资源管理错误漏洞 — ipa 5.3 Medium2020-04-27
CVE-2019-19301 Siemens SCALANCE X-200IRT 资源管理错误漏洞 — SCALANCE X200-4P IRT 7.5 High2020-04-14
CVE-2019-19300 多款Siemens产品 资源管理错误漏洞 — Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 7.5 High2020-04-14
CVE-2020-1625 Junos OS: Kernel memory leak in virtual-memory due to interface flaps — Junos OS 6.5 Medium2020-04-08
CVE-2020-5347 Dell EMC Isilon OneFS 资源管理错误漏洞 — Isilon OneFS 5.3 Medium2020-04-03
CVE-2019-18904 Migrations requests can cause DoS on rmt — SUSE Linux Enterprise High Performance Computing 15-ESPOS 6.5 Medium2020-04-03
CVE-2020-8136 fastify-multipart 资源管理错误漏洞 — fastify-multipart 7.5 -2020-03-20
CVE-2019-18336 多款Siemens产品资源管理错误漏洞 — SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) 7.5 -2020-03-10
CVE-2019-19281 多款Siemens产品资源管理错误漏洞 — SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) 7.5 -2020-03-10
CVE-2020-6986 Omron PLC CJ series 资源管理错误漏洞 — Omron PLC CJ Series 7.5 -2020-03-05
CVE-2020-3190 Cisco IOS XR Software IPsec Packet Processor Denial of Service Vulnerability — Cisco IOS XR Software 8.6 -2020-03-04
CVE-2020-3181 Cisco Email Security Appliance Uncontrolled Resource Exhaustion Vulnerability — Cisco Email Security Appliance (ESA) 6.5 -2020-03-04

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1420 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.