Cyber Posture

CWE · MITRE source

CWE-390Detection of Error Condition Without Action

Abstraction: Base · CVEs in our corpus: 14

The product detects a specific error, but takes no actions to handle the error.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (10)AI

Showing the 9 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
IR-1Policy and ProceduresIRProcedures require detection of error/incident conditions followed by defined response actions.
IR-3Incident Response TestingIRIR testing verifies that detected error conditions trigger appropriate response actions rather than being ignored.
IR-4Incident HandlingIRThe containment, eradication, and recovery steps ensure detected incidents trigger concrete actions rather than no response.
PM-31Continuous Monitoring StrategyPMRequires response actions to analysis of monitoring data, directly preventing detection of error conditions without follow-up action.
PM-6Measures of PerformancePMReporting on security performance measures requires confirming that detected error conditions trigger appropriate actions rather than being ignored.
AU-5Response to Audit Logging Process FailuresAURequires explicit action (alert plus additional responses) on audit logging failures rather than detecting the error condition without acting.
CA-7Continuous MonitoringCAThe control mandates response actions to address results from monitoring and assessments, preventing detection of error conditions without subsequent corrective action.
SC-24Fail in Known StateSCEnsures that detected error conditions trigger an explicit action to reach the known failure state.
SI-17Fail-safe ProceduresSIEnsures that detected error conditions trigger the specified safe procedures instead of being observed without corrective action.
Show 1 more broadly-applicable controls
IR-7Incident Response AssistanceIRProvides assistance for handling incidents, ensuring detected error conditions lead to appropriate user actions rather than inaction.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-302556.45.30.88812024-04-04
CVE-2025-264655.86.80.73602025-02-18
CVE-2024-279192.97.50.23882024-04-04
CVE-2021-403912.09.80.00472021-11-19
CVE-2019-50511.98.80.01562019-07-03
CVE-2024-498411.67.80.00072025-05-06
CVE-2025-463671.67.80.00022025-11-13
CVE-2024-119421.35.90.01562024-12-05
CVE-2024-120861.36.10.00912025-01-14
CVE-2025-252041.36.30.00212025-02-14
CVE-2025-270391.36.60.00022025-10-09
CVE-2017-74851.25.90.00932017-05-12
CVE-2024-203161.25.80.00262024-03-27
CVE-2025-00290.00.00.00022026-02-10