Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-693 (保护机制失效) — Vulnerability Class 224

224 vulnerabilities classified as CWE-693 (保护机制失效). AI Chinese analysis included.

CWE-693 represents a critical vulnerability where software fails to implement or correctly utilize necessary security controls, leaving systems exposed to directed attacks. This weakness manifests in two primary forms: missing mechanisms, where no defense exists for a specific threat vector, and insufficient mechanisms, where existing safeguards are inadequate or improperly configured. Attackers typically exploit these gaps by bypassing authentication, escalating privileges, or accessing sensitive data that should have been restricted. To mitigate this risk, developers must conduct rigorous threat modeling to identify all potential attack surfaces and ensure comprehensive security controls are in place. Regular code reviews and automated security testing help verify that protection mechanisms function as intended. By adopting a defense-in-depth strategy and validating that every security feature is both present and robust, organizations can significantly reduce the likelihood of exploitation and maintain the integrity of their applications.

MITRE CWE Description
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path.
Common Consequences (1)
Access ControlBypass Protection Mechanism
CVE IDTitleCVSSSeverityPublished
CVE-2024-43513 BitLocker Security Feature Bypass Vulnerability — Windows 10 Version 1809 6.4 Medium2024-10-08
CVE-2024-20438 Cisco Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerability — Cisco Data Center Network Manager 6.3 Medium2024-10-02
CVE-2024-46976 Circumvention of cross site scripting Protection in @backstage/plugin-techdocs-backend — backstage 6.5 Medium2024-09-17
CVE-2024-45835 Insufficient Electron Fuses Configuration — Mattermost 2.5 Low2024-09-16
CVE-2024-45833 Mobile password gets saved in dictionary under conditions — Mattermost 4.5 Medium2024-09-16
CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability — Windows 10 Version 1809 6.5 Medium2024-09-10
CVE-2024-38226 Microsoft Publisher Security Feature Bypass Vulnerability — Microsoft Office 2019 7.3 High2024-09-10
CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability — Windows 10 Version 1809 5.4 Medium2024-09-10
CVE-2024-45411 Twig has a possible sandbox bypass — Twig 8.6 High2024-09-09
CVE-2022-4100 WP Cerber Security <= 9.4 - IP Protection Bypass — WP Cerber Security, Anti-spam & Malware Scan 5.3 Medium2024-08-31
CVE-2024-20284 Cisco NX-OS Software Python Parser Escape Vulnerability — Cisco NX-OS Software 5.3 Medium2024-08-28
CVE-2024-20286 Cisco NX-OS Software Python Parser Escape Vulnerability — Cisco NX-OS Software 5.3 Medium2024-08-28
CVE-2024-39836 Munged email address used for password resets and notifications — Mattermost 4.8 Medium2024-08-22
CVE-2024-38180 Windows SmartScreen Security Feature Bypass Vulnerability — Windows 10 Version 1809 8.8 High2024-08-13
CVE-2024-38213 Windows Mark of the Web Security Feature Bypass Vulnerability — Windows 10 Version 1809 6.5 Medium2024-08-13
CVE-2024-0101 NVIDIA多款产品 安全漏洞 — Mellanox OS 7.5 High2024-08-08
CVE-2024-6741 Openfind Mail2000 - HttpOnly flag bypass — Mail2000 V7.0 5.8 Medium2024-07-15
CVE-2024-38092 Azure CycleCloud Elevation of Privilege Vulnerability — Azure CycleCloud 7.9.10 8.8 High2024-07-09
CVE-2024-38070 Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability — Windows 10 Version 1809 7.8 High2024-07-09
CVE-2024-38058 BitLocker Security Feature Bypass Vulnerability — Windows 10 Version 1809 6.8 Medium2024-07-09
CVE-2024-39599 [CVE-2024-39599] Protection Mechanism Failure in SAP NetWeaver Application Server for ABAP and ABAP Platform — SAP NetWeaver Application Server for ABAP and ABAP Platform 4.7 Medium2024-07-09
CVE-2024-6153 Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability — Desktop 7.1AIHighAI2024-06-20
CVE-2024-37182 Lack of permissions prompting when opening external URLs — Mattermost 4.7 Medium2024-06-14
CVE-2024-36287 Bypass of TCC restrictions on macOS — Mattermost 3.8 Low2024-06-14
CVE-2024-5924 Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability — Dropbox Desktop 7.5AIHighAI2024-06-13
CVE-2024-30052 Visual Studio Remote Code Execution Vulnerability — Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) 4.7 Medium2024-06-11
CVE-2024-30041 Microsoft Bing Search Spoofing Vulnerability — Microsoft Bing Search for iOS 5.4 Medium2024-05-14
CVE-2024-30050 Windows Mark of the Web Security Feature Bypass Vulnerability — Windows 10 Version 1809 5.4 Medium2024-05-14
CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability — Windows 10 Version 1809 6.1 Medium2024-04-09
CVE-2024-29988 SmartScreen Prompt Security Feature Bypass Vulnerability — Windows 10 Version 1809 8.8 High2024-04-09

Vulnerabilities classified as CWE-693 (保护机制失效) represent 224 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.