6 vulnerabilities classified as CWE-645 (过度限制的账户封锁机制). AI Chinese analysis included.
CWE-645 represents a configuration weakness where an account lockout mechanism is overly restrictive, triggering too easily and inadvertently facilitating denial-of-service attacks against legitimate users. While intended to mitigate brute-force password guessing, this flaw allows attackers to maliciously exhaust the allowed login attempts by repeatedly entering incorrect credentials for specific target accounts. Consequently, valid users are locked out and unable to access the system, disrupting business operations and causing significant availability issues. To prevent this vulnerability, developers must implement robust lockout policies that balance security with usability. Best practices include incorporating CAPTCHA challenges after a few failed attempts, implementing progressive delays rather than immediate locks, and utilizing IP-based rate limiting alongside account-specific thresholds to distinguish between automated attacks and genuine user errors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25907 | Dell PowerScale OneFS 安全漏洞 — PowerScale OneFS | 5.3 | Medium | 2026-03-04 |
| CVE-2025-5241 | Denial-of-Service Vulnerability in MELSEC iQ-F Series — MELSEC iQ-F Series FX5U-32MT/ES | 5.3 | Medium | 2025-07-11 |
| CVE-2025-31947 | Repeated LDAP login failures can lock an LDAP account — Mattermost | 5.8 | Medium | 2025-05-15 |
| CVE-2024-37028 | BIG-IP Next Central Manager vulnerability — BIG-IP Next Central Manager | 5.3 | Medium | 2024-08-14 |
| CVE-2024-1722 | Keycloak-core: dos via account lockout | 3.7 | Low | 2024-02-27 |
| CVE-2023-4346 | KNX Connection Authorization 安全漏洞 — KNX Protocol Connection Authorization Option 1 | 7.5 | High | 2023-08-29 |
Vulnerabilities classified as CWE-645 (过度限制的账户封锁机制) represent 6 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.