Description
The product performs CPU computations using algorithms that are not as efficient as they could be for the needs of the developer, i.e., the computations can be optimized further.
Potential Impact
Availability
Reduce Performance, DoS: Resource Consumption (CPU)
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2022-37734 | Chain: lexer in Java-based GraphQL server does not enforce maximum of tokens early enough (CWE-696), allowing excessive CPU consumption (CWE-1176) |
Related Weaknesses
Frequently Asked Questions
What is CWE-1176?
CWE-1176 (Inefficient CPU Computation) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Class-level weakness. The product performs CPU computations using algorithms that are not as efficient as they could be for the needs of the developer, i.e., the computations can be optimized fur...
How can CWE-1176 be exploited?
Attackers can exploit CWE-1176 (Inefficient CPU Computation) to reduce performance, dos: resource consumption (cpu). This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1176?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-1176?
CWE-1176 is classified as a Class-level weakness (High abstraction). It has been observed in 1 real-world CVEs.