Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-671 (缺乏对安全的管理控制) — Vulnerability Class 4

4 vulnerabilities classified as CWE-671 (缺乏对安全的管理控制). AI Chinese analysis included.

CWE-671 represents a design flaw where software restricts administrators from customizing security configurations to match specific operational environments. This weakness typically arises when developers hardcode security policies or disable essential management interfaces, assuming a one-size-fits-all approach suffices for all deployments. Attackers exploit this rigidity by leveraging default settings that may be insufficient for the target’s threat landscape, or by manipulating the application’s behavior when administrative controls are absent or bypassed. To prevent this, developers must implement robust, granular configuration options that allow administrators to tailor security levels according to risk assessments. Providing clear documentation and intuitive interfaces for these settings ensures that security teams can effectively adapt the product to their unique infrastructure requirements, thereby maintaining optimal protection without compromising usability.

MITRE CWE Description
The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the product is being used. This introduces resultant weaknesses or prevents it from operating at a level of security that is desired by the administrator. If the product's administrator does not have the ability to manage security-related decisions at all times, then protecting the product from outside threats - including the product's developer - can become impossible. For example, a hard-coded account name and password cannot be changed by the administrator, thus exposing that product to attacks that the administrator can not prevent.
Common Consequences (1)
OtherVaries by Context
Examples (1)
The following code is an example of an internal hard-coded password in the back-end:
int VerifyAdmin(char *password) { if (strcmp(password, "Mew!")) { printf("Incorrect Password!\n"); return(0) } printf("Entering Diagnostic Mode...\n"); return(1); }
Bad · C
int VerifyAdmin(String password) { if (!password.equals("Mew!")) { return(0) } //Diagnostic Mode return(1); }
Bad · Java

Vulnerabilities classified as CWE-671 (缺乏对安全的管理控制) represent 4 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.