Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-771 (对活跃已分配资源丧失索引) — Vulnerability Class 4

4 vulnerabilities classified as CWE-771 (对活跃已分配资源丧失索引). AI Chinese analysis included.

CWE-771 represents a memory management weakness where software fails to maintain a valid reference to an allocated resource, preventing its proper reclamation. This oversight typically leads to resource leaks, causing applications to consume increasing amounts of memory or system handles over time. Attackers exploit this vulnerability to induce denial-of-service conditions by exhausting system resources, thereby rendering the application or host machine unresponsive. Developers mitigate this risk by implementing rigorous resource lifecycle management, ensuring that every allocated entity is explicitly released or dereferenced when no longer needed. In languages lacking automatic garbage collection, manual tracking and deterministic cleanup are essential. Even in managed environments, developers must avoid holding unnecessary references to transient objects, ensuring the garbage collector can effectively identify and reclaim unused memory, thus maintaining system stability and performance.

MITRE CWE Description
The product does not properly maintain a reference to a resource that has been allocated, which prevents the resource from being reclaimed. This does not necessarily apply in languages or frameworks that automatically perform garbage collection, since the removal of all references may act as a signal that the resource is ready to be reclaimed.
Common Consequences (1)
AvailabilityDoS: Resource Consumption (Other)
An attacker that can influence the allocation of resources that are not properly maintained could deplete the available resource pool and prevent all other processes from accessing the same type of resource.
Mitigations (1)
Operation, Architecture and DesignUse resource-limiting settings provided by the operating system or environment. For example, when managing system resources in POSIX, setrlimit() can be used to set limits for certain types of resources, and getrlimit() can determine how many resources are available. However, these functions are not available on all operating systems. When the current levels get close to the maximum that is define…
CVE IDTitleCVSSSeverityPublished
CVE-2026-20004 Cisco IOS XE Software 安全漏洞 — Cisco IOS XE Software 7.4 High2026-03-25
CVE-2024-56343 IBM Verify Identity Access Digital Credentials denial of service — Verify Identity Access Digital Credentials 4.3 Medium2025-06-06
CVE-2023-20244 Cisco Firepower Threat Defense 安全漏洞 — Cisco Firepower Threat Defense Software 8.6 High2023-11-01
CVE-2021-34720 Cisco IOS XR Software IP Service Level Agreements and Two-Way Active Measurement Protocol Denial of Service Vulnerability — Cisco IOS XR Software 8.6 High2021-09-09

Vulnerabilities classified as CWE-771 (对活跃已分配资源丧失索引) represent 4 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.