Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-617 (可达断言) — Vulnerability Class 233

233 vulnerabilities classified as CWE-617 (可达断言). AI Chinese analysis included.

CWE-617 represents a software weakness where an assertion statement, intended for debugging or internal logic validation, remains enabled in production code and can be triggered by external input. This flaw typically leads to a denial of service, as the application abruptly terminates or crashes when the assertion fails, rather than handling the error gracefully. Attackers exploit this by crafting specific inputs that violate the assumed invariants, forcing the program to exit unexpectedly. To mitigate this risk, developers must ensure that assertions are strictly disabled in production environments or replace them with robust error-handling mechanisms. By validating inputs and managing exceptions without relying on fatal assertions, teams can maintain application availability and prevent attackers from leveraging these logic checks for disruptive service interruptions.

MITRE CWE Description
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.
Common Consequences (1)
AvailabilityDoS: Crash, Exit, or Restart
An attacker that can trigger an assert statement can still lead to a denial of service if the relevant code can be triggered by an attacker, and if the scope of the assert() extends beyond the attacker's own session.
Mitigations (2)
ImplementationMake sensitive open/close operation non reachable by directly user-controlled data (e.g. open/close resources)
ImplementationPerform input validation on user data.
Examples (1)
In the excerpt below, an AssertionError (an unchecked exception) is thrown if the user hasn't entered an email address in an HTML form.
String email = request.getParameter("email_address"); assert email != null;
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2023-38470 Reachable assertion in avahi_escape_label — avahi 6.2 Medium2023-11-02
CVE-2023-38469 Reachable assertion in avahi_dns_packet_append_record — avahi 6.2 Medium2023-11-02
CVE-2023-44175 Junos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash — Junos OS 6.5 Medium2023-10-12
CVE-2023-24843 Reachable Assertion in Modem — Snapdragon 7.5 High2023-10-03
CVE-2023-3301 Triggerable assertion due to race condition in hot-unplug — qemu 5.6 Medium2023-09-13
CVE-2023-21653 Reachable Assertion in Modem — Snapdragon 7.5 High2023-09-05
CVE-2023-21646 Reachable Assertion in Modem — Snapdragon 7.5 High2023-09-05
CVE-2023-39949 Improper validation of sequence numbers leading to remotely reachable assertion failure — Fast-DDS 7.5 High2023-08-11
CVE-2023-39534 Malformed GAP submessage triggers assertion failure — Fast-DDS 7.5 High2023-08-11
CVE-2023-36840 Junos OS and Junos OS Evolved: An rpd crash occurs when a specific L2VPN command is run — Junos OS 5.5 Medium2023-07-14
CVE-2023-1428 Denial-of-Service in gRPC — gRPC 7.5 High2023-06-09
CVE-2022-40538 Reachable assertion in Modem — Snapdragon 7.5 High2023-06-06
CVE-2022-33251 Reachable assertion in Modem — Snapdragon 7.5 High2023-06-06
CVE-2022-22060 Reachable Assertion in Modem — Snapdragon 7.5 High2023-06-06
CVE-2023-33199 malformed proposed intoto v0.0.2 entries can cause a panic in Rekor — rekor 5.3 Medium2023-05-26
CVE-2023-2156 Linux kernel 安全漏洞 — Linux kernel (RPL protocol) 7.5 -2023-05-09
CVE-2022-40504 Reachable assertion in Modem — Snapdragon 7.5 High2023-05-02
CVE-2022-40508 Reachable assertion in Modem — Snapdragon 7.5 High2023-05-02
CVE-2022-34144 Reachable assertion in Modem — Snapdragon 7.5 High2023-05-02
CVE-2023-28856 `HINCRBYFLOAT` can be used to crash a redis-server process — redis 5.5 Medium2023-04-18
CVE-2022-40527 Reachable Assertion in WLAN Embedded SW — Snapdragon 7.5 High2023-03-07
CVE-2022-33272 Reachable assertion in Modem — Snapdragon 7.5 High2023-03-07
CVE-2022-33254 Reachable assertion in Modem — Snapdragon 7.5 High2023-03-07
CVE-2022-33250 Reachable assertion in Modem — Snapdragon 7.5 High2023-03-07
CVE-2022-33244 Reachable assertion in Modem — Snapdragon 7.5 High2023-03-07
CVE-2022-41893 `CHECK_EQ` fail in `tf.raw_ops.TensorListResize` in Tensorflow — tensorflow 4.8 Medium2022-11-18
CVE-2022-36012 Assertion fail on MLIR empty edge names in TensorFlow — tensorflow 5.9 Medium2022-09-16
CVE-2022-35994 `CHECK` fail in `CollectiveGather` in TensorFlow — tensorflow 5.9 Medium2022-09-16
CVE-2022-35993 `CHECK` fail in `SetSize` in TensorFlow — tensorflow 5.9 Medium2022-09-16
CVE-2022-35992 `CHECK` fail in `TensorListFromTensor` in TensorFlow — tensorflow 5.9 Medium2022-09-16

Vulnerabilities classified as CWE-617 (可达断言) represent 233 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.