Cyber Posture

CWE · MITRE source

CWE-436Interpretation Conflict

Abstraction: Class · CVEs in our corpus: 101

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2025-48384 KEV3.68.00.00622025-07-08
CVE-2025-252913.29.80.20842025-03-12
CVE-2021-284742.68.80.14082021-05-11
CVE-2023-248132.610.00.09322023-02-07
CVE-2025-252922.29.80.04712025-03-12
CVE-2019-195892.09.80.00422019-12-05
CVE-2020-101802.09.80.00472020-03-05
CVE-2021-453272.09.80.00872022-02-08
CVE-2018-65601.88.80.00092018-02-02
CVE-2018-199661.88.80.00122018-12-08
CVE-2019-187921.89.10.00182020-01-06
CVE-2021-15871.88.60.00572021-08-25
CVE-2022-360511.88.70.00302022-08-31
CVE-2023-394811.88.80.00262024-05-03
CVE-2024-384281.89.10.00202024-06-16
CVE-2026-338071.89.10.00022026-04-15
CVE-2026-62701.89.10.00062026-04-16
CVE-2026-412481.89.10.00112026-04-24
CVE-2023-364561.78.30.00382023-07-06
CVE-2025-128161.78.60.00082025-11-25
CVE-2019-175961.67.50.02342019-10-24
CVE-2020-93621.67.80.00212020-02-24
CVE-2020-93631.67.80.00062020-02-24
CVE-2020-32001.67.70.00312020-06-03
CVE-2021-346991.67.70.00702021-09-23