Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-591 (敏感数据存储于加锁不恰当的内存区域) — Vulnerability Class 73

73 vulnerabilities classified as CWE-591 (敏感数据存储于加锁不恰当的内存区域). AI Chinese analysis included.

CWE-591 represents a critical data exposure weakness where applications store sensitive information in memory regions that are not properly locked or are incorrectly managed by the operating system’s virtual memory manager. This oversight allows the system to swap these memory pages to disk storage, such as swap files or hibernation files, rendering the confidential data accessible to external actors who gain physical or administrative access to the storage medium. Attackers typically exploit this by analyzing disk dumps or swap files to retrieve plaintext secrets like passwords or cryptographic keys. To mitigate this risk, developers must explicitly lock sensitive memory pages using platform-specific APIs, such as VirtualLock on Windows or mlock on Unix-like systems, ensuring that critical data remains strictly in physical RAM and is never written to persistent storage, thereby preventing unauthorized recovery after the application releases the memory.

MITRE CWE Description
The product stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause the memory to be written to swap files on disk by the virtual memory manager. This can make the data more accessible to external actors. On Windows systems the VirtualLock function can lock a page of memory to ensure that it will remain present in memory and not be swapped to disk. However, on older versions of Windows, such as 95, 98, or Me, the VirtualLock() function is only a stub and provides no protection. On POSIX systems the mlock() call ensures that a page will stay resident in memory but does not guarantee that the page will not appear in the swap. Therefore, it is unsuitable for use as a protection mechanism for sensitive data. Some platforms, in particular Linux, do make the guarantee that the page will not be swapped, but this is non-standard and is not portable. Calls to mlock() also require supervisor privilege. Return values for both of these calls must be checked to ensure that the lock operation was actually successful.
Common Consequences (1)
ConfidentialityRead Application Data, Read Memory
Sensitive data that is written to a swap file may be exposed.
Mitigations (2)
Architecture and DesignIdentify data that needs to be protected from swapping and choose platform-appropriate protection mechanisms.
ImplementationCheck return values to ensure locking operations are successful.
CVE IDTitleCVSSSeverityPublished
CVE-2025-48819 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.1 High2025-07-08
CVE-2025-30394 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability — Windows Server 2012 5.9 Medium2025-05-13
CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.0 High2025-04-08
CVE-2025-27482 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2016 8.1 High2025-04-08
CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.5 High2025-04-08
CVE-2025-26648 Windows Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.8 High2025-04-08
CVE-2025-27475 Windows Update Stack Elevation of Privilege Vulnerability — Windows 11 version 22H2 7.0 High2025-04-08
CVE-2025-27471 Microsoft Streaming Service Denial of Service Vulnerability — Windows 10 Version 1507 5.9 Medium2025-04-08
CVE-2025-26686 Windows TCP/IP Remote Code Execution Vulnerability — Windows 10 Version 1507 7.5 High2025-04-08
CVE-2025-26665 Windows upnphost.dll Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.0 High2025-04-08
CVE-2025-24045 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2012 8.1 High2025-03-11
CVE-2025-24035 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows 10 Version 1507 8.1 High2025-03-11
CVE-2025-21224 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability — Windows 10 Version 21H2 8.1 High2025-01-14
CVE-2025-21309 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2012 8.1 High2025-01-14
CVE-2025-21294 Microsoft Digest Authentication Remote Code Execution Vulnerability — Windows 10 Version 1507 8.1 High2025-01-14
CVE-2024-49128 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2019 8.1 High2024-12-10
CVE-2024-49095 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-12-10
CVE-2024-49132 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows 10 Version 1809 8.1 High2024-12-10
CVE-2024-49123 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows 10 Version 1809 8.1 High2024-12-10
CVE-2024-49115 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2019 8.1 High2024-12-10
CVE-2024-49108 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2019 8.1 High2024-12-10
CVE-2024-49106 Windows Remote Desktop Services Remote Code Execution Vulnerability — Windows Server 2019 8.1 High2024-12-10
CVE-2024-49097 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-12-10
CVE-2024-49091 Windows Domain Name Service Remote Code Execution Vulnerability — Windows Server 2019 7.2 High2024-12-10
CVE-2024-43633 Windows Hyper-V Denial of Service Vulnerability — Windows 11 version 22H2 6.5 Medium2024-11-12
CVE-2024-38264 Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability — Windows Server 2025 5.9 Medium2024-11-12
CVE-2024-43563 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2024-10-08
CVE-2024-38262 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability — Windows Server 2019 7.5 High2024-10-08
CVE-2024-38263 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability — Windows Server 2019 7.5 High2024-09-10
CVE-2024-38137 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability — Windows Server 2022 7.0 High2024-08-13

Vulnerabilities classified as CWE-591 (敏感数据存储于加锁不恰当的内存区域) represent 73 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.