CWE-198: Use of Incorrect Byte Ordering

low-risk

The product receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and little-endian) when processing the input, causing an incorrect number or value to be used.

Abstraction: Variant

Common Consequences

Integrity Unexpected State

Detection Methods

Black Box

Because byte ordering bugs are usually very noticeable even with normal inputs, this bug is more likely to occur in rarely triggered error conditions, making them difficult to detect using black box methods.

Real-World Examples (1)

CVE CVSS EPSS KEV
CVE-2025-52980 7.5 0.1%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal