Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-494 (下载代码缺少完整性检查) — Vulnerability Class 101

101 vulnerabilities classified as CWE-494 (下载代码缺少完整性检查). AI Chinese analysis included.

CWE-494 represents a critical integrity verification weakness where software retrieves and executes code from remote sources without adequately validating its origin or authenticity. This vulnerability is typically exploited by attackers who compromise the distribution server, manipulate DNS records to redirect requests to malicious hosts, or intercept and alter the code during transit via man-in-the-middle attacks. Consequently, the application unknowingly runs compromised payloads, leading to full system takeover or data exfiltration. To mitigate this risk, developers must implement robust cryptographic verification mechanisms, such as digital signatures or checksums, ensuring that downloaded artifacts match their expected values. Additionally, utilizing secure transport protocols like HTTPS and maintaining strict certificate validation further prevents tampering, thereby guaranteeing that only trusted, unmodified code is executed within the application environment.

MITRE CWE Description
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
Common Consequences (1)
Integrity, Availability, Confidentiality, OtherExecute Unauthorized Code or Commands, Alter Execution Logic, Other
Executing untrusted code could compromise the control flow of the program. The untrusted code could execute attacker-controlled commands, read or modify sensitive resources, or prevent the software from functioning correctly for legitimate users.
Mitigations (5)
ImplementationPerform proper forward and reverse DNS lookups to detect DNS spoofing.
Architecture and Design, OperationEncrypt the code with a reliable encryption scheme before transmitting. This will only be a partial solution, since it will not detect DNS spoofing and it will not prevent your code from being modified on the hosting site.
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. Speficially, it may be helpful to use tools or frameworks to perform integrity checking on the transmitted code. When providing the code that is to be downloaded, such as for automatic updates of the software, then use cryptographic signatures for …
Architecture and Design, OperationRun your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database ad…
Architecture and Design, OperationRun the code in a "jail" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For ex…
Effectiveness: Limited
Examples (2)
This example loads an external class from a local subdirectory.
URL[] classURLs= new URL[]{ new URL("file:subdir/") }; URLClassLoader loader = new URLClassLoader(classURLs); Class loadedClass = Class.forName("loadMe", true, loader);
Bad · Java
This code includes an external script to get database credentials, then authenticates a user against the database, allowing access to the application.
//assume the password is already encrypted, avoiding CWE-312 function authenticate($username,$password){ include("http://external.example.com/dbInfo.php"); //dbInfo.php makes $dbhost, $dbuser, $dbpass, $dbname available mysql_connect($dbhost, $dbuser, $dbpass) or die ('Error connecting to mysql'); mysql_select_db($dbname); $query = 'Select * from users where username='.$username.' And password='.$password; $result = mysql_query($query); if(mysql_numrows($result) == 1){ mysql_close(); return true; } else{ mysql_close(); return false; } }
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2025-53696 Johnson Controls iSTAR Ultra 安全漏洞 — iSTAR Ultra 8.8AIHighAI2025-07-28
CVE-2025-7620 DSIC|Cross-browser Components for Official Document Creation - Remote Code Execution — Cross-browser Components for Official Document Creation 8.8 High2025-07-14
CVE-2025-27593 RCE due to Device Driver — SICK DL100-2xxxxxxx 9.3 Critical2025-03-14
CVE-2024-43169 IBM Engineering Requirements Management DOORS Next file download — Engineering Requirements Management DOORS Next 8.8 High2025-03-03
CVE-2025-1058 Schneider Electric ASCO 5310和ASCO 5350 安全漏洞 — ASCO 5310 Single-Channel Remote Annunciator 8.1 High2025-02-13
CVE-2024-52331 ECOVACS lawnmowers and vacuums deterministic firmware encryption key — Unspecified robots 7.5 High2025-01-23
CVE-2024-42183 HCL BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability — BigFix Patch Management Download Plug-ins 2.5 Low2025-01-23
CVE-2024-54126 Insufficient Integrity Verification Vulnerability in TP-Link Archer C50 — Archer C50 Wireless Router 6.8 -2024-12-05
CVE-2024-52583 WesHacks code includes links to Leostop tracking spyware infested files — WesHacks 8.2 High2024-11-18
CVE-2024-48974 Life2000 Ventilator does not perform proper file integrity checks when adopting firmware updates — Life2000 Ventilation System 9.3 Critical2024-11-14
CVE-2024-33660 Potential Firmware update without integrity check — AptioV 6.1AIMediumAI2024-11-12
CVE-2024-39819 Zoom Workplace Apps and SDK for Windows - Improper Privilege Management — Zoom Workplace Apps and SDK for Windows 6.7 Medium2024-07-15
CVE-2023-41921 Download of Code Without Integrity Check in Kiloview P1/P2 devices — P1/P2 9.8 Critical2024-07-02
CVE-2024-39348 Synology Router Manager 安全漏洞 — Synology Router Manager (SRM) 7.5 High2024-06-28
CVE-2024-30206 Siemens 多款产品 安全漏洞 — SIMATIC RTLS Locating Manager 8.8 High2024-05-14
CVE-2023-39474 Inductive Automation Ignition downloadLaunchClientJar Remote Code Execution Vulnerability — Ignition 7.8 -2024-05-03
CVE-2024-28878 IOSIX IO-1020 Micro ELD Download of Code Without Integrity Check — IO-1020 Micro ELD 9.6 Critical2024-04-12
CVE-2024-28850 WP Crontrol possible RCE when combined with a pre-condition — wp-crontrol 8.2 High2024-03-25
CVE-2024-27438 Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution — Apache Doris 8.8AIHighAI2024-03-21
CVE-2023-46144 PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check — AXC F 1152 6.5 Medium2023-12-14
CVE-2023-46143 Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check of PLC — Automation Worx Software Suite 7.5 High2023-12-14
CVE-2023-5592 Phoenix Contact: ProConOs prone to Download of Code Without Integrity Check — MULTIPROG 7.5 High2023-12-14
CVE-2023-5630 Schneider Electric Trio Q-Series Ethernet Data Radio 安全漏洞 — Trio Q-Series Ethernet Data Radio 6.5 Medium2023-12-14
CVE-2023-45838 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-45839 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-45840 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-45841 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-45842 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-43608 Buildroot 安全漏洞 — Buildroot 8.1 High2023-12-05
CVE-2023-5984 Schneider Electric ION8650和ION8800 安全漏洞 — ION8650 7.2 High2023-11-15

Vulnerabilities classified as CWE-494 (下载代码缺少完整性检查) represent 101 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.