Cyber Posture

CWE · MITRE source

CWE-755Improper Handling of Exceptional Conditions

Abstraction: Class · CVEs in our corpus: 560

The product does not handle or incorrectly handles an exceptional condition.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (10)AI

Control Title Family Why it addresses this CWE
CP-12Safe ModeCPSupplies a concrete handling action (safe mode) for exceptional conditions, mitigating risks from improper or absent handling that could allow continued attacks.
CP-3Contingency TrainingCPBy preparing users for contingency scenarios, the control promotes proper handling of exceptional conditions instead of default or unsafe behaviors.
CP-5Contingency Plan UpdateCPAn updated contingency plan defines current actions for exceptional conditions, reducing the window for attackers to exploit improper handling leading to system failure.
IR-1Policy and ProceduresIRProcedures ensure proper handling of exceptional conditions to support effective incident response.
IR-3Incident Response TestingIRIncident response testing confirms proper handling of exceptional conditions to limit exploit impact.
IR-7Incident Response AssistanceIRGives users guidance on incident handling, reducing improper handling of exceptional conditions that could stem from exploited weaknesses.
SI-13Predictable Failure PreventionSIPrepared component exchange provides a defined recovery path, making improper handling of failures less exploitable.
SI-17Fail-safe ProceduresSIMandates defined procedures that ensure exceptional conditions are handled in a controlled, secure manner instead of being ignored or mishandled.
AU-5Response to Audit Logging Process FailuresAUProvides defined handling (alert and additional actions) for the exceptional condition of audit logging failure.
SC-24Fail in Known StateSCEnforces structured response to exceptional conditions so the system cannot remain in an unsafe state.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2017-5638 KEV9.69.80.94272017-03-11
CVE-2020-7247 KEV9.69.80.94112020-01-29
CVE-2021-38003 KEV7.78.80.65712021-11-23
CVE-2019-142876.98.80.85812019-10-17
CVE-2018-09346.67.50.85292018-03-14
CVE-2019-128156.69.80.76902019-07-19
CVE-2018-0155 KEV4.68.60.14502018-03-28
CVE-2024-29748 KEV3.67.80.00412024-04-05
CVE-2022-369233.57.50.32502022-08-10
CVE-2022-231213.29.80.20812023-03-28
CVE-2024-347502.87.50.21542024-07-03
CVE-2023-369332.47.50.14492023-07-05
CVE-2019-107422.37.50.13092019-05-07
CVE-2018-78492.37.50.12922019-05-22
CVE-2018-78522.37.50.12922019-05-22
CVE-2019-144312.39.80.05502019-07-29
CVE-2021-432722.39.80.05202021-11-14
CVE-2019-143782.28.80.06582019-07-29
CVE-2019-171952.29.80.04272019-10-15
CVE-2021-281652.27.50.11992021-04-01
CVE-2017-56642.17.50.10802017-06-06
CVE-2021-421422.19.80.02042024-01-23
CVE-2017-28772.09.80.00472018-09-19
CVE-2018-199912.09.80.00482018-12-10
CVE-2019-62562.09.80.00562019-01-14