Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-754 (对因果或异常条件的不恰当检查) — Vulnerability Class 272

272 vulnerabilities classified as CWE-754 (对因果或异常条件的不恰当检查). AI Chinese analysis included.

CWE-754 represents a critical software weakness where applications fail to properly validate or handle unexpected environmental states, such as resource exhaustion, permission denials, or malformed inputs. Developers often exploit this oversight by assuming routine operational conditions will always hold true, leading to crashes, data corruption, or security breaches when rare events occur. Attackers typically trigger these exceptional conditions to cause denial-of-service attacks or to bypass security controls by forcing the application into an undefined state. To mitigate this risk, engineers must implement robust error handling mechanisms that explicitly check for and gracefully manage unusual scenarios. This includes validating resource availability, verifying user permissions, and ensuring inputs meet expected formats before processing, thereby maintaining system stability and security even under adverse or unexpected operating conditions.

MITRE CWE Description
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. The programmer may assume that certain events or conditions will never occur or do not need to be worried about, such as low memory conditions, lack of access to resources due to restrictive permissions, or misbehaving clients or components. However, attackers may intentionally trigger these unusual conditions, thus violating the programmer's assumptions, possibly introducing instability, incorrect behavior, or a vulnerability. Note that this entry is not exclusively about the use of exceptions and exception handling, which are mechanisms for both checking and handling unusual or unexpected conditions.
Common Consequences (1)
Integrity, AvailabilityDoS: Crash, Exit, or Restart, Unexpected State
The data which were produced as a result of a function call could be in a bad state upon return. If the return value is not checked, then this bad data may be used in operations, possibly leading to a crash or other unintended behaviors.
Mitigations (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Choose languages with features such as exception handling that force the programmer to anticipate unusual conditions that may generate exceptions. Custom exceptions may need to be developed to handle unusual business-logic conditions. Be careful not to pass sensitive exceptions…
ImplementationCheck the results of all functions that return a value and verify that the value is expected.
Effectiveness: High
ImplementationIf using exception handling, catch and throw specific exceptions instead of overly-general exceptions (CWE-396, CWE-397). Catch and handle exceptions as locally as possible so that exceptions do not propagate too far up the call stack (CWE-705). Avoid unchecked or uncaught exceptions where feasible (CWE-248).
Effectiveness: High
ImplementationEnsure that error messages only contain minimal details that are useful to the intended audience and no one else. The messages need to strike the balance between being too cryptic (which can confuse users) or being too detailed (which may reveal more than intended). The messages should not reveal the methods that were used to determine the error. Attackers can use detailed information to refine or…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Examples (2)
Consider the following code segment:
char buf[10], cp_buf[10]; fgets(buf, 10, stdin); strcpy(cp_buf, buf);
Bad · C
The following code does not check to see if memory allocation succeeded before attempting to use the pointer returned by malloc().
buf = (char*) malloc(req_size); strncpy(buf, xfer, req_size);
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2022-32749 Apache Traffic Server: Improperly handled requests can cause crashes in specific plugins — Apache Traffic Server 7.5 -2022-12-19
CVE-2022-3616 OctoRPKI crash when maximum iterations number is reached — OctoRPKI 5.4 Medium2022-10-28
CVE-2022-22238 Junos OS and Junos OS Evolved: The rpd process will crash when a malformed incoming RESV message is processed — Junos OS 5.3 Medium2022-10-18
CVE-2022-22235 Junos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed — Junos OS 5.9 Medium2022-10-18
CVE-2022-22227 Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization — Junos OS Evolved 5.3 Medium2022-10-18
CVE-2022-20837 Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability — Cisco IOS XE Software 8.6 High2022-10-10
CVE-2022-39288 Denial of service in Fastify via Content-Type header — fastify 7.5 High2022-10-10
CVE-2022-27563 Overload/denial of service affects HCL VersionVault Express — HCL VersionVault Express 7.5 High2022-08-30
CVE-2022-22217 Junos OS: QFX10K Series: Denial of Service (DoS) upon receipt of crafted MLD packets on multi-homing ESI in VXLAN — Junos OS 6.1 Medium2022-07-20
CVE-2022-26078 Gallagher Controller 6000 安全漏洞 — Gallagher Controller 6000 7.5 High2022-07-06
CVE-2022-31103 Improper handling of CSS at-rules in lettersanitizer — lettersanitizer 7.5 High2022-06-27
CVE-2022-31093 Improper Handling of `callbackUrl` parameter in next-auth — next-auth 7.5 High2022-06-27
CVE-2022-23712 Elasticsearch 安全漏洞 — elasticsearch 7.5 -2022-06-06
CVE-2022-29473 F5 BIG-IP 代码问题漏洞 — BIG-IP 5.9 Medium2022-05-05
CVE-2022-28706 F5 BIG-IP 代码问题漏洞 — BIG-IP 5.9 Medium2022-05-05
CVE-2022-26130 F5 BIG-IP 代码问题漏洞 — BIG-IP 5.3 Medium2022-05-05
CVE-2022-28793 Samsung Galaxy S3 代码问题漏洞 — Samsung Mobile Devices 4.4 Medium2022-05-03
CVE-2022-20804 Cisco Unified Communications Products Denial of Service Vulnerability — Cisco Unified Communications Manager 5.3 Medium2022-04-21
CVE-2022-22196 Junos OS and Junos OS Evolved: The rpd CPU spikes to 100% after a malformed ISIS TLV has been received — Junos OS 6.5 Medium2022-04-14
CVE-2022-22194 Junos OS Evolved: PTX series: An attacker sending a crafted GRE packet will cause the PFE to restart — Junos OS Evolved 7.5 High2022-04-14
CVE-2022-22185 Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet — Junos OS 7.5 High2022-04-14
CVE-2022-24323 Schneider Electric EcoStruxure Control Expert和Schneider Electric EcoStruxure Process Exper 代码问题漏洞 — EcoStruxure Process Expert 5.3 Medium2022-03-09
CVE-2021-42020 Siemens RUGGEDCOM代码问题漏洞 — RUGGEDCOM i800 7.5 High2022-03-08
CVE-2022-24321 EcoStruxure Geo SCADA Expert 代码问题漏洞 — ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions) 7.5 -2022-02-09
CVE-2022-23572 Crash when type cannot be specialized in Tensorflow — tensorflow 6.5 Medium2022-02-04
CVE-2022-23590 Crash due to erroneous `StatusOr` in Tensorflow — tensorflow 5.9 Medium2022-02-04
CVE-2022-23593 Segfault in `simplifyBroadcast` in Tensorflow — tensorflow 5.9 Medium2022-02-04
CVE-2022-22180 Junos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets — Junos OS 7.5 High2022-01-19
CVE-2022-21676 Uncaught Exception in engine.io — engine.io 7.5 High2022-01-12
CVE-2021-37862 Mattermost 代码问题漏洞 — Mattermost 3.7 Low2021-12-17

Vulnerabilities classified as CWE-754 (对因果或异常条件的不恰当检查) represent 272 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.