4 vulnerabilities classified as CWE-412 (未加限制的外部可访问锁). AI Chinese analysis included.
CWE-412 represents a concurrency weakness where a synchronization mechanism, such as a mutex or exclusive lock, is improperly exposed to external actors. This vulnerability arises when the product validates the lock’s existence but fails to restrict who can manipulate its state, allowing unauthorized users to influence the locking logic. Attackers typically exploit this by acquiring or releasing the lock maliciously, causing denial of service through resource starvation or inducing race conditions that compromise data integrity. To prevent this, developers must enforce strict access controls on synchronization primitives, ensuring that only trusted, internal application components can acquire or modify locks. By isolating these critical resources from external input and validating the caller’s identity before granting lock access, engineers can maintain system stability and protect shared resources from unauthorized interference.
function writeToLog($message){ $logfile = fopen("logFile.log", "a"); //attempt to get logfile lock if (flock($logfile, LOCK_EX)) { fwrite($logfile,$message); // unlock logfile flock($logfile, LOCK_UN); } else { print "Could not obtain lock on logFile.log, message not recorded\n"; } } fclose($logFile);| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25612 | Internal ResourceId collision may affect unrelated collections — MongoDB Server | 6.5 | Medium | 2026-02-10 |
| CVE-2023-22318 | Denial of service against webconf — Checkmk Appliance | 7.5 | High | 2023-05-15 |
| CVE-2019-11485 | apport created lock file in wrong directory — apport | 3.3 | Low | 2020-02-08 |
| CVE-2019-18269 | Omron PLC CJ series安全漏洞 — Omron PLC CJ Series | 9.8 | - | 2019-12-16 |
Vulnerabilities classified as CWE-412 (未加限制的外部可访问锁) represent 4 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.