CWE-1037: Processor Optimization Removal or Modification of Security-critical Code
low-riskThe developer builds a security-critical protection mechanism into the software, but the processor optimizes the execution of the program such that the mechanism is removed or modified.
Abstraction: Base
Common Consequences
Integrity
→
Bypass Protection Mechanism
Detection Methods
White Box
In theory this weakness can be detected through the use of white box testing techniques where specifically crafted test cases are used in conjunction with debuggers to verify the order of statements being executed.
Real-World Examples (5)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-37985 | 5.9 | 0.8% | — |
| CVE-2025-48810 | 5.5 | 0.4% | — |
| CVE-2025-48809 | 5.5 | 0.4% | — |
| CVE-2025-26636 | 5.5 | 0.4% | — |
| CVE-2024-45335 | 8.4 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal