CWE-636: Not Failing Securely ('Failing Open')
low-riskWhen the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.
Abstraction: Class
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-43532 | 8.8 | 61.4% | — |
| CVE-2023-28841 | 6.8 | 3.1% | — |
| CVE-2021-1578 | 8.8 | 1.0% | — |
| CVE-2024-8185 | 7.5 | 0.8% | — |
| CVE-2023-28842 | 6.8 | 0.6% | — |
| CVE-2024-2660 | 6.4 | 0.6% | — |
| CVE-2024-3729 | 9.8 | 0.6% | — |
| CVE-2023-28840 | 7.5 | 0.5% | — |
| CVE-2023-22943 | 4.8 | 0.3% | — |
| CVE-2025-21210 | 4.2 | 0.2% | — |
2
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
0/50 · Minimal