Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-923 (通信信道对预期端点的不适当限制) — Vulnerability Class 44

44 vulnerabilities classified as CWE-923 (通信信道对预期端点的不适当限制). AI Chinese analysis included.

CWE-923 represents a critical architectural flaw where software fails to verify the identity of a communication endpoint, allowing connections to proceed without proper authentication or validation. Attackers typically exploit this vulnerability by spoofing the intended target’s identity, often through IP address manipulation or socket hijacking, thereby tricking the application into granting privileged access to unauthorized entities. This misdirection enables attackers to intercept sensitive data or execute malicious commands under the guise of a trusted service. To mitigate this risk, developers must implement robust endpoint verification mechanisms, such as mutual TLS authentication, strict IP whitelisting, and certificate pinning. By ensuring that every communication channel is rigorously authenticated against a known, trusted source, organizations can prevent unauthorized entities from impersonating legitimate endpoints and maintain the integrity of their network communications.

MITRE CWE Description
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint. Attackers might be able to spoof the intended endpoint from a different system or process, thus gaining the same level of access as the intended endpoint. While this issue frequently involves authentication between network-based clients and servers, other types of communication channels and endpoints can have this weakness.
Common Consequences (1)
Integrity, ConfidentialityGain Privileges or Assume Identity
If an attacker can spoof the endpoint, the attacker gains all the privileges that were intended for the original endpoint.
Examples (2)
These cross-domain policy files mean to allow Flash and Silverlight applications hosted on other domains to access its data:
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd"> <allow-access-from domain="*.example.com"/> <allow-access-from domain="*"/> </cross-domain-policy>
Bad · XML
<?xml version="1.0" encoding="utf-8"?> <access-policy> <cross-domain-access> <policy> <allow-from http-request-headers="SOAPAction"> <domain uri="*"/> </allow-from> <grant-to> <resource path="/" include-subpaths="true"/> </grant-to> </policy> </cross-domain-access> </access-policy>
Bad · XML
This Android application will remove a user account when it receives an intent to do so:
IntentFilter filter = new IntentFilter("com.example.RemoveUser"); MyReceiver receiver = new MyReceiver(); registerReceiver(receiver, filter); public class DeleteReceiver extends BroadcastReceiver { @Override public void onReceive(Context context, Intent intent) { int userID = intent.getIntExtra("userID"); destroyUserData(userID); } }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2026-22726 Route Services Firewall Bypass — Routing release 5.0 Medium2026-04-30
CVE-2025-36180 Inadequate Pod Communication Restrictions, affects watsonx.data — watsonx.data 5.3 Medium2026-04-30
CVE-2026-34205 Home Assistant: Unauthenticated App (Add-on) Endpoints Exposed to Local Network via Host Network Mode — Home Assistant Operating System 9.7 Critical2026-03-27
CVE-2025-36438 Multiple Vulnerabilities in IBM Concert Software — Concert 5.1 Medium2026-03-25
CVE-2025-62843 QuRouter — QuRouter 6.8 -2026-03-20
CVE-2026-23664 Azure IoT Explorer Information Disclosure Vulnerability — Azure IoT Explorer 7.5 High2026-03-10
CVE-2025-27769 Siemens Heliox Flex 180 kW EV Charging Station和Siemens Heliox Mobile DC 40 kW EV Charging Station 安全漏洞 — Heliox Flex 180 kW EV Charging Station 2.6 Low2026-03-10
CVE-2025-61939 Columbia Weather Systems MicroServer Improper Restriction of Communication Channel to Intended Endpoints — MicroServer 8.8 High2026-01-07
CVE-2025-33176 NVIDIA RunAI 安全漏洞 — RunAI 6.2 Medium2025-11-04
CVE-2025-12357 International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints — EV Car Chargers 6.3 Medium2025-10-31
CVE-2025-49734 PowerShell Direct Elevation of Privilege Vulnerability — PowerShell 7.4 7.0 High2025-09-09
CVE-2025-48807 Windows Hyper-V Remote Code Execution Vulnerability — Windows 10 Version 1607 6.7 Medium2025-08-12
CVE-2025-35978 Fujitsu UpdateNavi和UpdateNaviInstallService 安全漏洞 — UpdateNavi 7.8AIHighAI2025-06-12
CVE-2025-22251 Fortinet FortiOS 安全漏洞 — FortiOS 3.0 Low2025-06-10
CVE-2025-20261 Cisco Integrated Management Controller Privilege Escalation Vulnerability — Cisco Unified Computing System (Managed) 8.8 High2025-06-04
CVE-2025-48999 Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability — dataease 7.5AIHighAI2025-06-03
CVE-2025-46566 Dataease redshift JDBC Connection Remote Code Execution — dataease 8.8AIHighAI2025-05-01
CVE-2025-23178 Ribbon Communications - CWE-923: Improper Restriction of Communication Channel to Intended Endpoints — Apollo 9608 7.6 High2025-04-29
CVE-2025-31144 SIOS Technology Quick Agent 安全漏洞 — Quick Agent V3 9.8 -2025-04-27
CVE-2024-26013 Fortinet多款产品 安全漏洞 — FortiProxy 7.1 High2025-04-08
CVE-2025-29986 Dell Common Event Enabler 安全漏洞 — Common Event Enabler 8.3 High2025-04-08
CVE-2022-43916 IBM App Connect Enterprise Certified Container improper communications restriction — App Connect Enterprise Certified Container 6.8 Medium2025-01-30
CVE-2024-22315 IBM Fusion improper communication restriction — Fusion 4.0 Medium2025-01-28
CVE-2024-47490 Junos OS Evolved: ACX 7000 Series: Receipt of specific transit MPLS packets causes resources to be exhausted — Junos OS Evolved 8.2 High2024-10-11
CVE-2024-43571 Sudo for Windows Spoofing Vulnerability — Windows 11 Version 24H2 5.6 Medium2024-10-08
CVE-2024-47125 Improper Restriction of Communication Channel to Intended Endpoints in goTenna Pro — Pro 8.1 High2024-09-26
CVE-2024-39537 Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over the network — Junos OS Evolved 6.5 Medium2024-07-11
CVE-2024-6222 In Docker Desktop before v4.29.0 an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages — Docker Desktop 7.8AIHighAI2024-07-09
CVE-2024-24974 OpenVPN 安全漏洞 — OpenVPN 2 8.3AIHighAI2024-07-08
CVE-2024-26131 Element Android Intent Redirection — element-android 8.4 High2024-02-20

Vulnerabilities classified as CWE-923 (通信信道对预期端点的不适当限制) represent 44 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.