Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-617 (可达断言) — Vulnerability Class 234

234 vulnerabilities classified as CWE-617 (可达断言). AI Chinese analysis included.

CWE-617 represents a software weakness where an assertion statement, intended for debugging or internal logic validation, remains enabled in production code and can be triggered by external input. This flaw typically leads to a denial of service, as the application abruptly terminates or crashes when the assertion fails, rather than handling the error gracefully. Attackers exploit this by crafting specific inputs that violate the assumed invariants, forcing the program to exit unexpectedly. To mitigate this risk, developers must ensure that assertions are strictly disabled in production environments or replace them with robust error-handling mechanisms. By validating inputs and managing exceptions without relying on fatal assertions, teams can maintain application availability and prevent attackers from leveraging these logic checks for disruptive service interruptions.

MITRE CWE Description
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.
Common Consequences (1)
AvailabilityDoS: Crash, Exit, or Restart
An attacker that can trigger an assert statement can still lead to a denial of service if the relevant code can be triggered by an attacker, and if the scope of the assert() extends beyond the attacker's own session.
Mitigations (2)
ImplementationMake sensitive open/close operation non reachable by directly user-controlled data (e.g. open/close resources)
ImplementationPerform input validation on user data.
Examples (1)
In the excerpt below, an AssertionError (an unchecked exception) is thrown if the user hasn't entered an email address in an HTML form.
String email = request.getParameter("email_address"); assert email != null;
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2025-9405 Open5GS gmm-sm.c gmm_state_exception assertion — Open5GS 5.3 Medium2025-08-25
CVE-2025-9403 jqlang jq JSON jq_test.c run_jq_tests assertion — jq 3.3 Low2025-08-25
CVE-2025-9301 cmake cmForEachCommand.cxx ReplayItems assertion — cmake 3.3 Low2025-08-21
CVE-2025-30034 Siemens SIMATIC RTLS Locating Manager 安全漏洞 — SIMATIC RTLS Locating Manager 6.2 Medium2025-08-12
CVE-2025-8836 JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion — JasPer 3.3 Low2025-08-11
CVE-2025-8804 Open5GS AMF ngap_build_downlink_nas_transport assertion — Open5GS 5.3 Medium2025-08-10
CVE-2025-8698 Open5GS AMF Service nsmf-handler.c amf_nsmf_pdusession_handle_release_sm_context assertion — Open5GS 3.3 Low2025-08-07
CVE-2025-27073 Reachable Assertion in WLAN Firmware — Snapdragon 7.5 High2025-08-06
CVE-2025-27066 Reachable Assertion in WLAN Firmware — Snapdragon 7.5 High2025-08-06
CVE-2025-21452 Reachable Assertion in Modem — Snapdragon 7.5 High2025-08-06
CVE-2025-50422 Freedesktop Poppler 安全漏洞 — Cairo 2.9 Low2025-08-04
CVE-2025-54350 iperf 安全漏洞 — iperf3 3.7 Low2025-08-03
CVE-2025-46354 Bloomberg Comdb2 安全漏洞 — Comdb2 7.5 High2025-07-22
CVE-2025-36512 Bloomberg Comdb2 安全漏洞 — Comdb2 7.5 High2025-07-22
CVE-2025-40777 A possible assertion failure when 'stale-answer-client-timeout' is set to '0' — BIND 9 7.5 High2025-07-16
CVE-2025-7485 Open5GS SCTP Partial Message recv_handler assertion — Open5GS 3.3 Low2025-07-12
CVE-2025-52964 Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipath configured — Junos OS 6.5 Medium2025-07-11
CVE-2025-52958 Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash — Junos OS 5.3 Medium2025-07-11
CVE-2025-24798 Meshtastic crashes via an unimplemented routing module reply — firmware 4.3 Medium2025-07-10
CVE-2025-49630 Apache HTTP Server: mod_proxy_http2 denial of service — Apache HTTP Server 7.5AIHighAI2025-07-10
CVE-2025-6952 Open5GS AMF Service amf-sm.c amf_state_operational assertion — Open5GS 3.3 Low2025-07-01
CVE-2025-6536 Tarantool datetime.c tm_to_datetime assertion — Tarantool 3.3 Low2025-06-24
CVE-2025-6497 HTACG tidy-html5 parser.c prvTidyParseNamespace assertion — tidy-html5 3.3 Low2025-06-23
CVE-2025-6273 WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion — wabt 3.3 Low2025-06-19
CVE-2025-5520 Open5GS AMF/MME emm_state_authentication assertion — Open5GS 5.3 Medium2025-06-03
CVE-2025-5501 Open5GS NGAP PathSwitchRequest Message ngap-handler.c ngap_handle_path_switch_request_transfer assertion — Open5GS 5.3 Medium2025-06-03
CVE-2025-20666 MediaTek Chipsets 安全漏洞 — MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8667, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798 7.5AIHighAI2025-05-05
CVE-2025-47229 GNU PSPP 安全漏洞 — PSPP 2.9 Low2025-05-03
CVE-2025-31160 atop 安全漏洞 — atop 2.9 Low2025-03-26
CVE-2024-20147 MediaTek Chipsets 安全漏洞 — MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6985, MT6989, MT6990, MT7902, MT7920, MT7921, MT7922, MT7925, MT7927, MT8195, MT8370, MT8390, MT8395, MT8518S, MT8532, MT8678 6.5 -2025-02-03

Vulnerabilities classified as CWE-617 (可达断言) represent 234 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.