CWE-405: Asymmetric Resource Consumption (Amplification)
low-riskThe product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is "asymmetric."
Abstraction: Class
Common Consequences
Availability
→
DoS: Amplification
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2019-11479 | 7.5 | 13.4% | — |
| CVE-2024-11187 | 7.5 | 4.1% | — |
| CVE-2024-45590 | 7.5 | 1.5% | — |
| CVE-2024-55628 | 7.5 | 0.5% | — |
| CVE-2025-43857 | 6.5 | 0.5% | — |
| CVE-2024-28214 | 2.7 | 0.5% | — |
| CVE-2024-34702 | 5.3 | 0.4% | — |
| CVE-2025-24356 | 7.5 | 0.4% | — |
| CVE-2018-15492 | 7.5 | 0.4% | — |
| CVE-2021-21359 | 5.9 | 0.3% | — |
1
/ 100
low-risk
Active Threat
1/50 · Minimal
Exploit Availability
0/50 · Minimal