CWE · MITRE source
CWE-436Interpretation Conflict
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2025-48384 KEV | 3.6 | 8.0 | 0.0062 | 2025-07-08 |
CVE-2025-25291 | 3.2 | 9.8 | 0.2084 | 2025-03-12 |
CVE-2021-28474 | 2.6 | 8.8 | 0.1408 | 2021-05-11 |
CVE-2023-24813 | 2.6 | 10.0 | 0.0932 | 2023-02-07 |
CVE-2025-25292 | 2.2 | 9.8 | 0.0471 | 2025-03-12 |
CVE-2019-19589 | 2.0 | 9.8 | 0.0042 | 2019-12-05 |
CVE-2020-10180 | 2.0 | 9.8 | 0.0047 | 2020-03-05 |
CVE-2021-45327 | 2.0 | 9.8 | 0.0087 | 2022-02-08 |
CVE-2018-6560 | 1.8 | 8.8 | 0.0009 | 2018-02-02 |
CVE-2018-19966 | 1.8 | 8.8 | 0.0012 | 2018-12-08 |
CVE-2019-18792 | 1.8 | 9.1 | 0.0018 | 2020-01-06 |
CVE-2021-1587 | 1.8 | 8.6 | 0.0057 | 2021-08-25 |
CVE-2022-36051 | 1.8 | 8.7 | 0.0030 | 2022-08-31 |
CVE-2023-39481 | 1.8 | 8.8 | 0.0026 | 2024-05-03 |
CVE-2024-38428 | 1.8 | 9.1 | 0.0020 | 2024-06-16 |
CVE-2026-33807 | 1.8 | 9.1 | 0.0002 | 2026-04-15 |
CVE-2026-6270 | 1.8 | 9.1 | 0.0006 | 2026-04-16 |
CVE-2026-41248 | 1.8 | 9.1 | 0.0011 | 2026-04-24 |
CVE-2023-36456 | 1.7 | 8.3 | 0.0038 | 2023-07-06 |
CVE-2025-12816 | 1.7 | 8.6 | 0.0008 | 2025-11-25 |
CVE-2019-17596 | 1.6 | 7.5 | 0.0234 | 2019-10-24 |
CVE-2020-9362 | 1.6 | 7.8 | 0.0021 | 2020-02-24 |
CVE-2020-9363 | 1.6 | 7.8 | 0.0006 | 2020-02-24 |
CVE-2020-3200 | 1.6 | 7.7 | 0.0031 | 2020-06-03 |
CVE-2021-34699 | 1.6 | 7.7 | 0.0070 | 2021-09-23 |