Cyber Posture

CWE · MITRE source

CWE-636Not Failing Securely ('Failing Open')

Abstraction: Class · CVEs in our corpus: 27

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.

By entering a less secure state, the product inherits the weaknesses associated with that state, making it easier to compromise. At the least, it causes administrators to have a false sense of security. This weakness typically occurs as a result of wanting to "fail functional" to minimize administration and support costs, instead of "failing safe."

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (9)AI

Control Title Family Why it addresses this CWE
SI-13Predictable Failure PreventionSIStandby components and explicit exchange criteria enforce a controlled, secure failover instead of failing open.
SI-17Fail-safe ProceduresSIDirectly implements fail-safe (fail-closed/secure) behavior on indicated failures, preventing the system from defaulting to an insecure open state.
SI-6Security and Privacy Function VerificationSIFailed verification tests trigger alerts, reducing the window for exploitation when systems fail open.
AU-15Alternate Audit Logging CapabilityAUEnsures audit logging continues on primary failure instead of failing open with no logging capability.
AU-5Response to Audit Logging Process FailuresAUSupports failing securely by requiring alerts and configurable actions (e.g., shutdown) when the audit mechanism fails instead of continuing without it.
CP-12Safe ModeCPEntering safe mode when conditions are detected prevents failing open and continuing normal operation in a potentially exploitable state.
CP-13Alternative Security MechanismsCPEnsures security functions remain enforced via alternatives instead of defaulting to an insecure state when the primary means fails.
SA-8Security and Privacy Engineering PrinciplesSAFail-safe-defaults principle prevents systems from failing open.
SC-24Fail in Known StateSCDirectly requires transition to a known (secure) state on failure, preventing fail-open behavior.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-435325.48.80.61412024-10-08
CVE-2024-37292.09.80.00552024-05-02
CVE-2026-220342.09.80.00052026-01-08
CVE-2021-15781.88.80.01052021-08-25
CVE-2026-405251.89.10.00292026-04-17
CVE-2023-40301.78.40.00072023-08-17
CVE-2023-288411.66.80.04192023-04-04
CVE-2026-352051.67.80.00022026-04-09
CVE-2023-288401.57.50.00652023-04-04
CVE-2024-81851.57.50.00812024-10-31
CVE-2026-350421.57.50.00022026-04-06
CVE-2026-402471.57.50.00032026-04-16
CVE-2026-402481.57.50.00032026-04-16
CVE-2026-424231.57.50.00052026-04-28
CVE-2023-288421.46.80.00862023-04-04
CVE-2021-36141.36.40.00052021-07-16
CVE-2024-26601.36.40.00692024-04-04
CVE-2026-413341.36.50.00052026-04-23
CVE-2026-274481.15.30.00042026-03-18
CVE-2026-402491.15.30.00022026-04-16
CVE-2023-229431.04.80.00332023-02-14
CVE-2025-417591.04.90.00012026-03-09
CVE-2025-417601.04.90.00012026-03-09
CVE-2025-212100.94.20.00232025-01-14
CVE-2026-413770.94.60.00032026-04-28