CWE-358: Improperly Implemented Security Check for Standard
low-riskThe product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2018-1270 | 9.8 | 90.0% | — |
| CVE-2018-1275 | 9.8 | 38.1% | — |
| CVE-2024-7965 | 8.8 | 26.8% | Y |
| CVE-2017-15664 | 7.5 | 19.4% | — |
| CVE-2017-15662 | 7.5 | 19.4% | — |
| CVE-2019-6742 | 9.8 | 19.2% | — |
| CVE-2017-15663 | 7.5 | 18.1% | — |
| CVE-2017-15665 | 7.5 | 15.4% | — |
| CVE-2018-0268 | 10.0 | 9.6% | — |
| CVE-2018-0268 | 10.0 | 9.6% | — |
8
/ 100
low-risk
Active Threat
8/50 · Minimal
Exploit Availability
0/50 · Minimal