Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-941 (通信信道中错误指定的目的地) — Vulnerability Class 5

5 vulnerabilities classified as CWE-941 (通信信道中错误指定的目的地). AI Chinese analysis included.

CWE-941 represents a critical architectural flaw where software establishes a communication channel but fails to correctly specify the intended destination for the outgoing request. This weakness typically arises from improper configuration or dynamic routing errors, allowing attackers to exploit the misdirection by spoofing trusted servers. By intercepting or redirecting these communications, adversaries can steal sensitive data, inject malicious payloads, or cause denial of service conditions against the intended target. To mitigate this risk, developers must implement strict validation mechanisms for all network endpoints, ensuring that destinations are explicitly defined and verified against a whitelist of authorized hosts. Utilizing secure protocols like TLS with certificate pinning further prevents man-in-the-middle attacks, while rigorous input validation and automated testing during the development lifecycle help identify and correct routing logic errors before deployment, thereby ensuring communications reach only their intended, secure recipients.

MITRE CWE Description
The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor. Attackers at the destination may be able to spoof trusted servers to steal data or cause a denial of service. There are at least two distinct weaknesses that can cause the product to communicate with an unintended destination: If the product allows an attacker to control which destination is specified, then the attacker can cause it to connect to an untrusted or malicious destination. For example, because UDP is a connectionless protocol, UDP packets can be spoofed by specifying a false source address in the packet; when the server receives the packet and sends a reply, it will specify a destination by using the source of the incoming packet - i.e., the false source. The server can then be tricked into sending traffic to the wrong host, which is effective for hiding the real source of an attack and for conducting a distributed denial of service (DDoS). As another example, server-side request forgery (SSRF) and XML External Entity (XXE) can be used to trick a server into making outgoing requests to hosts that cannot be directly accessed by the attacker due to firewall restrictions. If the product incorrectly specifies the destination, then an attacker who can control this destination might be able to spoof trusted servers. While the most common occurrence is likely due to misconfiguration by an administrator, this …
Common Consequences (1)
Access Control, OtherGain Privileges or Assume Identity, Varies by Context, Bypass Protection Mechanism
An attacker can access any functionality that is inadvertently accessible to the source.
Examples (1)
This code listens on a port for DNS requests and sends the result to the requesting address.
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.bind( (UDP_IP,UDP_PORT) ) while true: data = sock.recvfrom(1024) if not data: break (requestIP, nameToResolve) = parseUDPpacket(data) record = resolveName(nameToResolve) sendResponse(requestIP,record)
Bad · Python
CVE IDTitleCVSSSeverityPublished
CVE-2026-40118 Arcserve UDP Console 安全漏洞 — UDP Console 4.3AIMediumAI2026-04-16
CVE-2025-53899 Kiteworks MFT is vulnerable to an Incorrectly Specified Destination in a Communication Channel — security-advisories 7.2 High2025-11-29
CVE-2023-33198 Incorrectly Specified Chat Message Destinations in tgstation-server and DreamMaker API — tgstation-server 6.1 Medium2023-05-30
CVE-2022-4847 Incorrectly Specified Destination in a Communication Channel in usememos/memos — usememos/memos--2022-12-29
CVE-2019-18242 Moxa IOxpress configuration utility和ioLogik 2500 安全漏洞 — Moxa ioLogik 2500 series firmware, Version 3.0 or lower, IOxpress configuration utility, Version 2.3.0 or lower 7.5 -2020-03-24

Vulnerabilities classified as CWE-941 (通信信道中错误指定的目的地) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.