CWE · MITRE source
CWE-506Embedded Malicious Code
The product contains code that appears to be malicious in nature.
Malicious flaws have acquired colorful names, including Trojan horse, trapdoor, timebomb, and logic-bomb. A developer might insert malicious code with the intent to subvert the security of a product or its host system at some time in the future. It generally refers to a program that performs a useful service but exploits rights of the program's user in a way the user does not intend.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (35)AI
Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
SR-1 | Policy and Procedures | SR | Supply chain risk management procedures include controls to detect and prevent insertion of malicious code through suppliers and vendors. |
SR-10 | Inspection of Systems or Components | SR | Direct inspection of components can detect embedded malicious code inserted through supply-chain or runtime tampering. |
SR-11 | Component Authenticity | SR | Counterfeit components are a common vector for embedding malicious code; preventing their entry reduces this exposure. |
SA-1 | Policy and Procedures | SA | Acquisition procedures can prescribe integrity checks, code review, and provenance validation to reduce introduction of embedded malicious code. |
SA-10 | Developer Configuration Management | SA | Requiring documented, approved changes plus security flaw tracking makes undetected insertion of malicious code substantially harder. |
SA-12 | Supply Chain Protection | SA | The control mandates vetting suppliers and tamper detection, making it harder for malicious code to be embedded by upstream providers. |
SC-18 | Mobile Code | SC | Monitoring mobile code usage enables detection of embedded malicious code delivered through allowed mobile code channels. |
SC-25 | Thin Nodes | SC | Reduced code footprint and storage make insertion or persistence of embedded malicious code far less feasible. |
SC-29 | Heterogeneity | SC | Embedding malicious code becomes far harder to achieve uniformly when components use heterogeneous languages, runtimes, and hardware. |
CM-10 | Software Usage Restrictions | CM | Restricting software to licensed versions and controlling P2P prevents introduction of software containing embedded malicious code from unauthorized sources. |
CM-11 | User-installed Software | CM | The control prevents users from installing software that contains embedded malicious code. |
CM-8 | System Component Inventory | CM | Regular inventory reviews and updates make it harder to conceal or exploit embedded malicious code by requiring all components to be documented and accounted for. |
SI-14 | Non-persistence | SI | Any embedded malicious code or backdoor written into an instance is erased at termination, rendering persistence mechanisms ineffective across successive instances. |
SI-3 | Malicious Code Protection | SI | Directly detects and eradicates embedded malicious code at entry/exit points via periodic and real-time scans. |
SI-7 | Software, Firmware, and Information Integrity | SI | Unauthorized insertion of malicious code into software or firmware is revealed by integrity monitoring. |
Show 20 more broadly-applicable controls
SR-2 | Supply Chain Risk Management Plan | SR | A supply chain risk management plan requires vetting suppliers and components to prevent introduction of embedded malicious code throughout the system lifecycle. |
SR-3 | Supply Chain Controls and Processes | SR | Identifying weaknesses and applying supplier controls reduces the likelihood of embedded malicious code being introduced through procured elements. |
SR-4 | Provenance | SR | Valid provenance monitoring makes insertion of embedded malicious code during supply chain or development stages detectable. |
SR-5 | Acquisition Strategies, Tools, and Methods | SR | Acquisition strategies can require trusted suppliers, code reviews, and integrity attestations that directly reduce the likelihood of receiving components with embedded malicious code. |
SR-6 | Supplier Assessments and Reviews | SR | Reviews of suppliers and their deliverables can detect or deter introduction of embedded malicious code. |
SR-8 | Notification Agreements | SR | Notification agreements enable suppliers to alert acquirers to discovered or suspected embedded malicious code, directly supporting detection and response. |
SR-9 | Tamper Resistance and Detection | SR | Tamper detection mechanisms can identify embedded malicious code inserted via supply-chain or runtime tampering. |
SA-13 | Trustworthiness | SA | Directly reduces risk of embedded malicious code by requiring verification that acquired or developed components perform only as specified without hidden malicious behavior. |
SA-19 | Component Authenticity | SA | Authenticity verification and anti-counterfeit procedures detect and block components that may contain embedded malicious code or backdoors. |
SA-20 | Customized Development of Critical Components | SA | In-house development of critical components eliminates the attack surface of vendor-embedded malicious code. |
SA-21 | Developer Screening | SA | Screening developers for trustworthiness and appropriate authorizations directly reduces the likelihood that a malicious insider will intentionally embed malicious code during development. |
SA-6 | Software Usage Restrictions | SA | Mandating only contract-approved software reduces the chance of introducing binaries that contain embedded malicious code. |
SC-34 | Non-modifiable Executable Programs | SC | Prevents embedding or persistence of malicious code in the OS or specified applications since the media cannot be written. |
SC-44 | Detonation Chambers | SC | Detonation chambers directly detect and analyze embedded malicious code by executing it in isolation before it reaches production systems. |
RA-10 | Threat Hunting | RA | The capability explicitly searches for embedded malicious code and backdoors as indicators of compromise. |
RA-6 | Technical Surveillance Countermeasures Survey | RA | TSCM directly targets and removes embedded malicious hardware or code planted for ongoing technical surveillance. |
CP-10 | System Recovery and Reconstitution | CP | Reverting to a known state removes any malicious code embedded by an attacker. |
MA-3 | Maintenance Tools | MA | The approval and review process for maintenance tools can prevent introduction or continued use of tools containing embedded malicious code. |
PM-30 | Supply Chain Risk Management Strategy | PM | Supply chain strategy requires vetting and controls during acquisition to prevent or detect insertion of malicious code by vendors or integrators. |
PS-2 | Position Risk Designation | PS | Background screening for development or deployment roles makes intentional insertion of malicious code by insiders materially harder to accomplish. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2025-30066 KEV | 9.2 | 8.6 | 0.9183 | 2025-03-15 |
CVE-2024-3094 | 7.1 | 10.0 | 0.8506 | 2024-03-29 |
CVE-2025-59374 KEV | 6.0 | 9.8 | 0.3475 | 2025-12-17 |
CVE-2025-30154 KEV | 5.8 | 8.6 | 0.3399 | 2025-03-19 |
CVE-2026-33634 KEV | 4.8 | 8.8 | 0.1683 | 2026-03-23 |
CVE-2024-4978 KEV | 4.5 | 8.4 | 0.1415 | 2024-05-23 |
CVE-2025-54313 KEV | 4.2 | 7.5 | 0.1162 | 2025-07-19 |
CVE-2017-16128 | 2.0 | 9.8 | 0.0032 | 2018-06-07 |
CVE-2026-31976 | 2.0 | 9.8 | 0.0008 | 2026-03-11 |
CVE-2026-34841 | 2.0 | 9.8 | 0.0003 | 2026-04-06 |
CVE-2026-34424 | 2.0 | 9.8 | 0.0024 | 2026-04-09 |
CVE-2026-6443 | 2.0 | 9.8 | 0.0006 | 2026-04-17 |
CVE-2020-15165 | 1.9 | 9.3 | 0.0020 | 2020-08-28 |
CVE-2025-10894 | 1.9 | 9.6 | 0.0008 | 2025-09-24 |
CVE-2023-2003 | 1.8 | 9.1 | 0.0034 | 2023-07-13 |
CVE-2017-16047 | 1.5 | 7.5 | 0.0032 | 2018-05-29 |
CVE-2017-16061 | 1.5 | 7.5 | 0.0026 | 2018-05-29 |
CVE-2017-16062 | 1.5 | 7.5 | 0.0026 | 2018-05-29 |
CVE-2017-16044 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16045 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16046 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16048 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16049 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16050 | 1.5 | 7.5 | 0.0026 | 2018-06-04 |
CVE-2017-16051 | 1.5 | 7.5 | 0.0033 | 2018-06-04 |