Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2019-0059 Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host. — Junos OS 7.5 High2019-10-09
CVE-2019-12714 Cisco IC3000 Industrial Compute Gateway Denial of Service Vulnerability — Cisco IC3000 Industrial Compute Gateway 6.5 -2019-10-02
CVE-2019-12700 Cisco FTD, FMC, and FXOS Software Pluggable Authentication Module Denial of Service Vulnerability — Cisco Firepower Management Center 6.5 -2019-10-02
CVE-2019-12698 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CPU Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2019-10-02
CVE-2019-12658 Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability — Cisco IOS XE Software 16.1.1 7.5 -2019-09-25
CVE-2019-11060 HG100 contains an Uncontrolled Resource Consumption vulnerability — HG100 firmware 7.5 -2019-08-29
CVE-2019-1965 Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability — Cisco NX-OS Software 6.5 -2019-08-28
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9512 Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9513 Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9515 Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9517 Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-10942 Siemens SCALANCE X-200IRT 资源管理错误漏洞 — SCALANCE X-200 switch family (incl. SIPLUS NET variants) 7.5 -2019-08-13
CVE-2019-9514 Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service — n/a 7.5 -2019-08-13
CVE-2019-10162 PowerDNS Authoritative Server 授权问题漏洞 — pdns 7.5 -2019-07-30
CVE-2019-10972 Mitsubishi Electric FR Configurator2 资源管理错误漏洞 — Mitsubishi Electric FR Configurator2 5.5 -2019-07-25
CVE-2019-1010266 lodash 资源管理错误漏洞 — lodash 7.5 -2019-07-17
CVE-2019-0046 Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface. — Junos OS 6.5 -2019-07-11
CVE-2019-5445 Ubiquiti EdgeMAX EdgeSwitch 资源管理错误漏洞 — EdgeMAX 4.9 -2019-07-10
CVE-2019-1873 Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2019-07-10
CVE-2019-10977 Mitsubishi Electric QJ71E71-100 资源管理错误漏洞 — MELSEC-Q series Ethernet module 7.5 -2019-05-23
CVE-2019-1814 Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability — Cisco Small Business 300 Series Managed Switches 8.6 -2019-05-15
CVE-2019-6578 多款Siemens产品资源管理错误漏洞 — SINAMICS PERFECT HARMONY GH180 with NXG I control, MLFBs: 6SR2...-, 6SR3...-, 6SR4...- 7.5 -2019-05-14
CVE-2019-1703 Cisco Firepower Threat Defense Software Packet Processing Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 8.6 -2019-05-03
CVE-2019-1704 Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities — Cisco Firepower Threat Defense Software 7.4 -2019-05-03
CVE-2019-1696 Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities — Cisco Firepower Threat Defense Software 7.4 -2019-05-03
CVE-2018-15388 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 7.5 -2019-05-03
CVE-2019-10952 Rockwell Automation CompactLogix 5370 Uncontrolled Resource Consumption — CompactLogix 5370 L1 controllers 9.8 -2019-05-01

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.