Cyber Posture

CWE · MITRE source

CWE-693Protection Mechanism Failure

Abstraction: Pillar · CVEs in our corpus: 460

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (58)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
PM-11Mission and Business Process DefinitionPMMandates determining protection needs from defined processes, reducing the likelihood that protection mechanisms are omitted or ineffective by design.
PM-13Security and Privacy WorkforcePMSkilled personnel implement protection mechanisms correctly, lowering protection-mechanism failures.
PM-14Testing, Training, and MonitoringPMThe control requires systematic testing and monitoring of protection mechanisms to confirm they function as intended against organizational risks.
PL-1Policy and ProceduresPLRequiring procedures that facilitate implementation of planning controls reduces the chance that protection mechanisms are omitted or inconsistently applied.
PL-10Baseline SelectionPLSelecting an impact-appropriate control baseline ensures a minimum set of protection mechanisms are applied, directly reducing the chance that critical safeguards are omitted.
PL-11Baseline TailoringPLTailoring validates that selected protection mechanisms remain effective after scoping, parameterization, and compensating-control decisions are applied.
SA-11Developer Testing and EvaluationSAAssessments of security controls directly validate whether protection mechanisms function as intended, exposing failures for correction.
SA-15Development Process, Standards, and ToolsSAMandates review that the selected process, standards, and tools can satisfy security requirements, reducing failure of protection mechanisms in the delivered system.
SA-17Developer Security and Privacy Architecture and DesignSARequires demonstrating integration of mechanisms into a coherent protection strategy, reducing failures from poorly composed or conflicting controls.
SI-1Policy and ProceduresSIRegular policy review and procedure updates reduce the likelihood that integrity protection mechanisms are omitted, misconfigured, or allowed to degrade.
SI-22Information DiversitySISupplies a backup mechanism that continues to function when the primary information protection or integrity control fails.
SI-4System MonitoringSIReveals failures or bypasses of existing protection mechanisms via event and anomaly analysis.
CA-1Policy and ProceduresCADocumented procedures to implement assessment, authorization, and monitoring controls prevent these protection mechanisms from failing due to undefined processes.
CA-2Control AssessmentsCADirect evaluation of whether controls produce desired security outcomes detects protection mechanism failures and enables remediation.
CA-4Security CertificationCARequires assessment that protection mechanisms are correctly implemented and producing intended security outcomes.
Show 43 more broadly-applicable controls
PM-19Privacy Program Leadership RolePMExecutive-level ownership and resources help ensure privacy protection mechanisms are developed, implemented, and maintained.
PM-2Information Security Program Leadership RolePMLeadership and resources for the security program reduce the likelihood that protection mechanisms are missing, misconfigured, or neglected.
PM-26Complaint ManagementPMA formal redress process detects when protection mechanisms fail in practice and compels their repair, lowering the likelihood that known protection failures remain exploitable.
PM-28Risk FramingPMExplicit risk framing ensures protection mechanisms are selected, sized, and maintained consistent with organizational risk tolerance, reducing the chance that a mechanism fails because its risk context was never defined.
PM-3Information Security and Privacy ResourcesPMExplicit funding and documentation requirements reduce failures of protection mechanisms caused by under-resourcing.
PM-31Continuous Monitoring StrategyPMEstablishes continuous monitoring of control effectiveness with defined metrics and response actions, detecting protection mechanism failures.
PM-4Plan of Action and Milestones ProcessPMRequires ongoing maintenance of plans to repair or replace failed or inadequate protection mechanisms before they can be exploited at scale.
PM-6Measures of PerformancePMOngoing measurement and reporting of security control performance provides visibility into protection mechanism failures, enabling timely remediation.
PM-7Enterprise ArchitecturePMEnterprise architecture ensures protection mechanisms are selected, placed, and integrated consistently, reducing protection mechanism failures.
PM-9Risk Management StrategyPMRegular review and update of the risk strategy detects and corrects protection mechanism failures before exploitation.
PL-2System Security and Privacy PlansPLRequires documenting controls planned or in place to meet requirements plus rationale, reducing the chance that protection mechanisms are missing or ineffective due to poor planning.
PL-3System Security Plan UpdatePLPlan updates require reassessment of selected protection mechanisms, surfacing cases where they no longer address the current threat or implementation.
PL-7Concept of OperationsPLThe control requires organizations to describe how protection mechanisms will function in operation, thereby reducing the chance that those mechanisms fail due to undefined or inconsistent operational assumptions.
PL-8Security and Privacy ArchitecturesPLBy requiring integrated, updated architectures and CONOPS, the control reduces the likelihood that protection mechanisms are missing or inconsistently applied.
PL-9Central ManagementPLCentral management verifies that required protection mechanisms remain enabled and correctly configured, reducing protection-mechanism failures due to local drift.
SA-18Tamper Resistance and DetectionSAThe control explicitly requires implementation and verification of protection mechanisms that would otherwise fail and allow tampering.
SA-2Allocation of ResourcesSAMandates documented allocation of resources to protection requirements, reducing the likelihood that protection mechanisms are underfunded, omitted, or inadequately maintained.
SA-24Design For Cyber ResiliencySAMandates selection and application of resiliency techniques and implementation approaches that strengthen protection mechanisms against failure or bypass.
SA-8Security and Privacy Engineering PrinciplesSAEngineering principles ensure protection mechanisms are correctly specified and implemented.
SI-5Security Alerts, Advisories, and DirectivesSIImplementing issued security directives maintains the effectiveness of existing protection mechanisms against newly discovered bypasses or failures.
SI-6Security and Privacy Function VerificationSIExplicit verification and alerting detect when protection mechanisms are not functioning, limiting undetected bypasses.
SI-8Spam ProtectionSIRequiring deployment and timely updates of spam mechanisms prevents the absence or obsolescence of a protection mechanism that would otherwise be bypassed.
CA-5Plan of Action and MilestonesCAThe POA&M process ensures identified weaknesses in protection mechanisms are documented and scheduled for remediation, reducing the duration they remain exploitable.
CA-7Continuous MonitoringCAOngoing control assessments and analysis of monitoring data enable timely detection and response when protection mechanisms fail.
SC-1Policy and ProceduresSCRequires procedures that facilitate consistent implementation and periodic review of protection controls, making failure of those mechanisms less likely.
SC-29HeterogeneitySCDiverse technology stacks ensure a single protection mechanism failure (or exploit) does not cascade across all components.
SC-47Alternate Communications PathsSCFailure or compromise of the primary protection mechanism no longer results in total loss of C2 capability.
SC-48Sensor RelocationSCRelocating sensors under specified conditions prevents static protection mechanisms from being reliably bypassed or disabled once their locations are discovered.
SC-49Hardware-enforced Separation and Policy EnforcementSCHardware enforcement reduces the likelihood that protection mechanisms can be bypassed or fail due to software flaws.
RA-1Policy and ProceduresRADocumented risk assessment processes ensure protection mechanisms are identified, evaluated, and maintained rather than failing due to neglect.
RA-3Risk AssessmentRAPeriodic review of protection effectiveness against identified threats directly addresses failures in security mechanisms.
RA-4Risk Assessment UpdateRARisk assessment updates reveal when existing protection mechanisms have become ineffective against new attack techniques or environmental changes.
RA-7Risk ResponseRAWhen assessments or monitoring reveal that protection mechanisms are ineffective or bypassed, the required risk-response action directly restores or strengthens those mechanisms.
CP-13Alternative Security MechanismsCPProvides alternative mechanisms to maintain security functions when the primary implementation is unavailable or compromised, directly preventing protection mechanism failure.
CP-2Contingency PlanCPRequires planning for full restoration without deterioration of originally implemented controls, mitigating impact from protection mechanism failures during compromise or disruption.
CP-4Contingency Plan TestingCPThe contingency plan itself is a protection mechanism; regular testing and corrective actions ensure it does not fail when activated by an incident.
IR-10Integrated Information Security Analysis TeamIRThe integrated team focuses on root-cause analysis of security incidents, directly addressing failures in protection mechanisms that allow exploitation.
IR-8Incident Response PlanIRDeveloping, approving, updating, and maintaining the incident response plan ensures the organization's incident response protection mechanism does not fail due to absence of planning, outdated procedures, or lack of resources.
MA-1Policy and ProceduresMAThe policy and procedures ensure maintenance activities are planned and executed to keep protection mechanisms effective and prevent their degradation or failure.
MA-2Controlled MaintenanceMAChecking that all potentially impacted controls still function properly after maintenance detects and mitigates protection mechanism failures introduced during the process.
AC-25Reference MonitorACImplements a reliable, tamperproof protection mechanism whose completeness can be assured.
AT-1Policy and ProceduresATProcedures for training on protection mechanisms reduce the chance of protection mechanism failures being present or exploitable.
CM-4Impact AnalysesCMImpact analysis identifies changes that could weaken or disable existing protection mechanisms.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2013-2465 KEV9.69.80.93222013-06-18
CVE-2019-1003030 KEV9.69.90.92882019-03-08
CVE-2024-21412 KEV9.28.10.93772024-02-13
CVE-2013-0431 KEV8.65.30.91592013-01-31
CVE-2025-40536 KEV7.88.10.68912026-01-28
CVE-2024-29988 KEV7.48.80.60502024-04-09
CVE-2024-38213 KEV6.96.50.59322024-08-13
CVE-2025-0411 KEV6.57.00.52412025-01-25
CVE-2026-21513 KEV5.48.80.28112026-02-10
CVE-2024-341445.09.80.50052024-05-02
CVE-2026-21510 KEV4.08.80.04042026-02-10
CVE-2024-38217 KEV3.85.40.12122024-09-10
CVE-2024-38226 KEV3.57.30.01432024-09-10
CVE-2018-67943.35.30.37432018-02-07
CVE-2026-32202 KEV3.34.30.07192026-04-14
CVE-2022-314792.59.60.09072022-06-06
CVE-2022-359782.47.70.13732022-08-15
CVE-2024-380922.38.80.09812024-07-09
CVE-2017-109522.28.80.07262017-08-29
CVE-2024-381802.28.80.06542024-08-13
CVE-2017-31972.19.80.02842018-07-09
CVE-2021-328352.19.90.02512021-09-09
CVE-2017-88642.09.80.00652017-11-22
CVE-2018-93112.09.80.00842018-05-31
CVE-2018-93182.09.80.00842018-05-31