Cyber Posture

CWE · MITRE source

CWE-348Use of Less Trusted Source

Abstraction: Base · CVEs in our corpus: 45

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)SCPrevents use of less-trusted or adversarial sources by requiring proof of origin and integrity before accepting responses.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-454102.89.80.13952024-09-19
CVE-2022-318132.09.80.00052022-06-09
CVE-2024-277731.88.80.00082024-03-18
CVE-2025-488651.89.10.00172025-05-30
CVE-2025-599511.89.10.00052025-10-01
CVE-2025-692401.88.80.00022026-03-16
CVE-2021-213741.68.10.00312021-03-26
CVE-2024-478801.68.10.00192024-10-24
CVE-2025-552921.68.20.00032026-01-28
CVE-2021-213731.57.50.00192021-03-26
CVE-2022-22551.57.50.00682022-08-25
CVE-2024-231051.57.50.00082024-05-14
CVE-2025-279131.57.50.00112025-03-10
CVE-2026-353911.57.50.00022026-04-06
CVE-2022-45391.45.30.05152024-08-31
CVE-2025-474241.47.10.00102025-05-09
CVE-2022-45371.36.50.00132023-05-09
CVE-2022-45321.36.50.00112024-08-17
CVE-2025-439181.36.40.00062025-04-19
CVE-2025-12451.36.50.00112025-05-16
CVE-2026-355071.36.40.00022026-04-03
CVE-2026-402261.36.40.00012026-04-10
CVE-2026-249101.25.90.00002026-01-27
CVE-2026-36351.26.10.00012026-03-23
CVE-2024-07891.15.30.00092024-06-19