Description
The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor.
Attackers at the destination may be able to spoof trusted servers to steal data or cause a denial of service. There are at least two distinct weaknesses that can cause the product to communicate with an unintended destination:
Potential Impact
Access Control, Other
Gain Privileges or Assume Identity, Varies by Context, Bypass Protection Mechanism
Demonstrative Examples
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)sock.bind( (UDP_IP,UDP_PORT) )while true:
data = sock.recvfrom(1024)if not data:break
(requestIP, nameToResolve) = parseUDPpacket(data)record = resolveName(nameToResolve)sendResponse(requestIP,record)Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2013-5211 | composite: NTP feature generates large responses (high amplification factor) with spoofed UDP source addresses. |
| CVE-1999-0513 | Classic "Smurf" attack, using spoofed ICMP packets to broadcast addresses. |
| CVE-1999-1379 | DNS query with spoofed source address causes more traffic to be returned to spoofed address than was sent by the attacker. |
Related Weaknesses
Frequently Asked Questions
What is CWE-941?
CWE-941 (Incorrectly Specified Destination in a Communication Channel) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor.
How can CWE-941 be exploited?
Attackers can exploit CWE-941 (Incorrectly Specified Destination in a Communication Channel) to gain privileges or assume identity, varies by context, bypass protection mechanism. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-941?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-941?
CWE-941 is classified as a Base-level weakness (Medium abstraction). It has been observed in 3 real-world CVEs.