CWE-1037: Processor Optimization Removal or Modification of Security-critical Code

low-risk

The developer builds a security-critical protection mechanism into the software, but the processor optimizes the execution of the program such that the mechanism is removed or modified.

Abstraction: Base

Common Consequences

Integrity Bypass Protection Mechanism

Detection Methods

White Box

In theory this weakness can be detected through the use of white box testing techniques where specifically crafted test cases are used in conjunction with debuggers to verify the order of statements being executed.

Real-World Examples (5)

CVE CVSS EPSS KEV
CVE-2024-37985 5.9 0.8%
CVE-2025-48810 5.5 0.4%
CVE-2025-48809 5.5 0.4%
CVE-2025-26636 5.5 0.4%
CVE-2024-45335 8.4 0.0%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal