Cyber Posture

CWE · MITRE source

CWE-754Improper Check for Unusual or Exceptional Conditions

Abstraction: Class · CVEs in our corpus: 558

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.

The programmer may assume that certain events or conditions will never occur or do not need to be worried about, such as low memory conditions, lack of access to resources due to restrictive permissions, or misbehaving clients or components. However, attackers may intentionally trigger these unusual conditions, thus violating the programmer's assumptions, possibly introducing instability, incorrect behavior, or a vulnerability. Note that this entry is not exclusively about the use of exceptions and exception handling, which are mechanisms for both checking and handling unusual or unexpected conditions.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (9)AI

Control Title Family Why it addresses this CWE
CP-12Safe ModeCPImplements detection of unusual or exceptional conditions followed by safe mode entry, reducing the window for exploitation of unchecked conditions.
CP-3Contingency TrainingCPTraining ensures users perform required checks for unusual or exceptional conditions as part of contingency roles, limiting attacker leverage from skipped validations.
SI-13Predictable Failure PreventionSIMTTF determination forces explicit checks for conditions that precede predictable component failure.
SI-6Security and Privacy Function VerificationSIAnomaly detection and alerting implement checks for unusual conditions that would otherwise go unnoticed.
AU-5Response to Audit Logging Process FailuresAURequires detection and response to audit logging failures as an unusual or exceptional condition.
IR-3Incident Response TestingIRIR testing directly validates checks for unusual or exceptional conditions that could indicate security incidents.
PM-31Continuous Monitoring StrategyPMRequires ongoing monitoring of organization-defined metrics and analysis, enabling checks for unusual or exceptional conditions.
SA-11Developer Testing and EvaluationSASecurity testing routinely checks for unusual or exceptional inputs/conditions, identifying missing validation steps that flaw remediation then resolves.
SC-24Fail in Known StateSCRequires detection of unusual conditions followed by a controlled transition to the defined failure state.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-3393 KEV8.27.50.77692024-12-27
CVE-2024-430445.78.80.65902024-08-07
CVE-2023-41993 KEV5.28.80.24172023-09-21
CVE-2021-3560 KEV4.17.80.09552022-02-16
CVE-2017-111443.97.50.40702017-07-10
CVE-2024-43673.88.80.34612024-05-14
CVE-2023-41992 KEV3.67.80.01062023-09-21
CVE-2018-72873.25.90.33112018-02-22
CVE-2022-201302.99.80.16092022-06-15
CVE-2020-161252.87.20.22102020-11-10
CVE-2020-280372.79.80.12732020-11-02
CVE-2019-196462.59.80.09462019-12-09
CVE-2024-523162.19.80.02672024-11-18
CVE-2019-00362.09.80.00262019-04-10
CVE-2019-159002.09.80.00352019-10-18
CVE-2020-105712.09.80.00422020-03-14
CVE-2020-89862.09.80.00922020-03-24
CVE-2021-02112.010.00.00392021-01-15
CVE-2021-336222.09.80.00552021-06-15
CVE-2017-201662.09.80.00602023-01-10
CVE-2023-373032.09.80.00242023-06-30
CVE-2024-37292.09.80.00552024-05-02
CVE-2024-78262.09.80.00302024-10-03
CVE-2026-240542.010.00.00092026-01-29
CVE-2026-46892.010.00.00032026-03-24