Cyber Posture

CWE · MITRE source

CWE-400Uncontrolled Resource Consumption

Abstraction: Class · CVEs in our corpus: 2,929

The product does not properly control the allocation and maintenance of a limited resource.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (21)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SC-10Network DisconnectSCTerminating idle connections bounds resource consumption that would otherwise allow uncontrolled accumulation of open sessions.
SC-22Architecture and Provisioning for Name/Address Resolution ServiceSCFault tolerance reduces the impact of resource-exhaustion attacks against the organization's name services.
SC-36Distributed Processing and StorageSCSpreading processing and storage across locations prevents a single resource pool from being exhausted by one attack, mitigating uncontrolled consumption.
CP-4Contingency Plan TestingCPContingency plan testing includes resource exhaustion scenarios to verify recovery, making it harder for attackers to sustain exploits that cause uncontrolled consumption.
CP-5Contingency Plan UpdateCPUpdated contingency plans include current procedures to detect, contain, and recover from resource exhaustion, limiting an attacker's ability to sustain impact from uncontrolled consumption.
CP-7Alternate Processing SiteCPAlternate site allows resumption of operations if resource exhaustion at the primary site is exploited to cause unavailability.
SI-13Predictable Failure PreventionSIMTTF monitoring plus ready substitutes directly mitigate sustained resource exhaustion by allowing component swap before or at failure.
SI-4System MonitoringSIMonitors for resource exhaustion and denial-of-service patterns that indicate uncontrolled consumption.
SI-8Spam ProtectionSIBlocking or throttling unsolicited messages at entry/exit points prevents attackers from flooding queues, storage, or processing resources.
SA-11Developer Testing and EvaluationSAResource consumption and denial-of-service testing performed under the assessment plan detects uncontrolled allocation paths that are subsequently fixed.
SA-24Design For Cyber ResiliencySAResiliency techniques such as redundancy, throttling, and adaptive response limit uncontrolled resource consumption and denial-of-service effects.
AC-10Concurrent Session ControlACLimiting concurrent sessions directly prevents uncontrolled resource consumption by capping the number of active sessions per user or account.
AU-6Audit Record Review, Analysis, and ReportingAUAnalysis identifies uncontrolled resource consumption indicative of denial-of-service or abuse attempts.
IR-10Integrated Information Security Analysis TeamIRThe team can analyze and respond to resource exhaustion incidents, reducing the impact of attacks that exploit uncontrolled consumption weaknesses.
MA-6Timely MaintenanceMATimely maintenance support and spare parts enable rapid recovery from failures induced by uncontrolled resource consumption, shortening the impact window of denial-of-service attacks.
Show 6 more broadly-applicable controls
SC-47Alternate Communications PathsSCAlternate paths allow continued C2 operations when an attacker exploits resource-consumption weaknesses against the primary channel.
SC-5Denial-of-service ProtectionSCDirectly limits uncontrolled resource consumption that leads to denial-of-service.
SC-6Resource AvailabilitySCDirectly mitigates uncontrolled consumption by enforcing allocation limits/quotas that preserve availability for legitimate use.
CP-8Telecommunications ServicesCPAlternate telecommunications services enable resumption of essential functions when primary services become unavailable due to uncontrolled resource consumption.
PL-6Security-related Activity PlanningPLPlanning and coordination of security activities (scans, tests, maintenance) directly imposes scheduling and throttling that prevents those activities from producing uncontrolled resource consumption.
PM-6Measures of PerformancePMPerformance metrics and monitoring inherently track resource consumption patterns, making uncontrolled consumption easier to detect and mitigate.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2021-44228 KEV9.710.00.94462021-12-10
CVE-2023-44487 KEV9.27.50.94452023-10-10
CVE-2021-228836.97.50.89432021-03-03
CVE-2019-56456.87.50.87882020-09-01
CVE-2018-63896.77.50.87482018-02-06
CVE-2018-10001156.57.50.82532018-03-05
CVE-2018-172816.37.50.80262018-09-24
CVE-2023-283426.37.50.79552023-04-05
CVE-2016-86105.87.50.71132017-11-13
CVE-2016-105425.57.50.66072018-05-31
CVE-2011-31925.40.00.90462011-08-29
CVE-2019-01995.47.50.65582019-04-10
CVE-2023-235525.37.50.63342023-02-01
CVE-2023-436225.27.50.61262023-10-23
CVE-2020-82775.17.50.59172020-11-19
CVE-2017-160865.07.50.57772018-06-07
CVE-2018-168434.87.50.55542018-11-07
CVE-2022-298854.87.50.55532022-05-12
CVE-2024-262124.77.50.53952024-04-09
CVE-2019-95124.67.50.51232019-08-13
CVE-2023-366064.57.50.49762023-10-10
CVE-2015-79784.17.50.42552017-01-30
CVE-2025-266734.17.50.44122025-04-08
CVE-2025-327244.17.50.44122025-06-10
CVE-2003-07144.00.00.67002003-11-17