Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-591 (敏感数据存储于加锁不恰当的内存区域) — Vulnerability Class 73

73 vulnerabilities classified as CWE-591 (敏感数据存储于加锁不恰当的内存区域). AI Chinese analysis included.

CWE-591 represents a critical data exposure weakness where applications store sensitive information in memory regions that are not properly locked or are incorrectly managed by the operating system’s virtual memory manager. This oversight allows the system to swap these memory pages to disk storage, such as swap files or hibernation files, rendering the confidential data accessible to external actors who gain physical or administrative access to the storage medium. Attackers typically exploit this by analyzing disk dumps or swap files to retrieve plaintext secrets like passwords or cryptographic keys. To mitigate this risk, developers must explicitly lock sensitive memory pages using platform-specific APIs, such as VirtualLock on Windows or mlock on Unix-like systems, ensuring that critical data remains strictly in physical RAM and is never written to persistent storage, thereby preventing unauthorized recovery after the application releases the memory.

MITRE CWE Description
The product stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause the memory to be written to swap files on disk by the virtual memory manager. This can make the data more accessible to external actors. On Windows systems the VirtualLock function can lock a page of memory to ensure that it will remain present in memory and not be swapped to disk. However, on older versions of Windows, such as 95, 98, or Me, the VirtualLock() function is only a stub and provides no protection. On POSIX systems the mlock() call ensures that a page will stay resident in memory but does not guarantee that the page will not appear in the swap. Therefore, it is unsuitable for use as a protection mechanism for sensitive data. Some platforms, in particular Linux, do make the guarantee that the page will not be swapped, but this is non-standard and is not portable. Calls to mlock() also require supervisor privilege. Return values for both of these calls must be checked to ensure that the lock operation was actually successful.
Common Consequences (1)
ConfidentialityRead Application Data, Read Memory
Sensitive data that is written to a swap file may be exposed.
Mitigations (2)
Architecture and DesignIdentify data that needs to be protected from swapping and choose platform-appropriate protection mechanisms.
ImplementationCheck return values to ensure locking operations are successful.
CVE IDTitleCVSSSeverityPublished
CVE-2024-38131 Clipboard Virtual Channel Extension Remote Code Execution Vulnerability — Windows 11 Version 24H2 8.8 High2024-08-13
CVE-2024-38106 Windows Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-08-13
CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-04-09
CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability — Windows Server 2022, 23H2 Edition (Server Core installation) 7.0 High2024-04-09
CVE-2024-21446 NTFS Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2024-03-12
CVE-2024-21405 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-02-13
CVE-2024-21355 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-02-13
CVE-2024-20686 Win32k Elevation of Privilege Vulnerability — Windows Server 2022, 23H2 Edition (Server Core installation) 7.8 High2024-01-09
CVE-2023-36005 Windows Telephony Server Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.5 High2023-12-12
CVE-2023-36403 Windows Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2023-11-14
CVE-2023-38159 Windows Graphics Component Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2023-10-10
CVE-2023-35310 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-35309 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability — Windows 10 Version 1809 7.5 High2023-07-11
CVE-2023-33163 Windows Network Load Balancing Remote Code Execution Vulnerability — Windows Server 2019 7.5 High2023-07-11
CVE-2023-35362 Windows Clip Service Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-07-11
CVE-2023-35360 Windows Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2023-07-11
CVE-2023-35345 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-35346 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-35344 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-35340 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-07-11
CVE-2023-32010 Windows Bus Filter Driver Elevation of Privilege Vulnerability — Windows 11 version 22H2 7.0 High2023-06-13
CVE-2023-24946 Windows Backup Service Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-05-09
CVE-2023-24899 Windows Graphics Component Elevation of Privilege Vulnerability — Windows Server 2022 7.0 High2023-05-09
CVE-2023-28283 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability — Windows 10 Version 1809 8.1 High2023-05-09
CVE-2023-28278 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-04-11
CVE-2023-28256 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-04-11
CVE-2023-28255 Windows DNS Server Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-04-11
CVE-2023-28273 Windows Clip Service Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2023-04-11
CVE-2023-28238 Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability — Windows 10 Version 1809 7.5 High2023-04-11
CVE-2023-28236 Windows Kernel Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-04-11

Vulnerabilities classified as CWE-591 (敏感数据存储于加锁不恰当的内存区域) represent 73 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.