Cyber Posture

CWE · MITRE source

CWE-829Inclusion of Functionality from Untrusted Control Sphere

Abstraction: Base · CVEs in our corpus: 234

The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (29)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SA-1Policy and ProceduresSAProcedures can mandate supply-chain vetting and restrictions on functionality obtained from untrusted third-party or external control spheres.
SA-12Supply Chain ProtectionSARequires use of trusted sources and provenance tracking, tangibly limiting inclusion of functionality from untrusted control spheres.
SA-13TrustworthinessSALimits inclusion of functionality from untrusted sources through supply-chain and component trustworthiness evaluation before integration.
SR-1Policy and ProceduresSRSupply chain policy and procedures require vetting of external components and suppliers, directly reducing the likelihood of incorporating functionality from untrusted sources.
SR-10Inspection of Systems or ComponentsSRInspection can detect malicious functionality that was included from an untrusted sphere through tampering or supply-chain attack.
SR-11Component AuthenticitySRAnti-counterfeit procedures directly block inclusion of components originating from untrusted supply-chain actors.
SC-18Mobile CodeSCDefining acceptable mobile code technologies and authorizing their use prevents inclusion of functionality from untrusted control spheres.
SC-29HeterogeneitySCDiversity of sources and implementations limits the blast radius when functionality is drawn from untrusted control spheres.
SC-35External Malicious Code IdentificationSCExternal identification of malicious code makes inclusion of functionality from untrusted network sources substantially harder to perform undetected.
CM-10Software Usage RestrictionsCMLimiting P2P file sharing technology reduces inclusion of functionality or resources from untrusted external control spheres.
CM-11User-installed SoftwareCMEnforcing installation policies prevents users from including functionality obtained from untrusted control spheres.
CM-8System Component InventoryCMThe inventory process requires identifying and recording the origin of all components, making inclusion of functionality from untrusted control spheres easier to detect during reviews.
MA-3Maintenance ToolsMARequiring approval and monitoring of maintenance tools prevents inclusion and execution of functionality obtained from untrusted sources.
MP-7Media UseMPUnowned portable devices represent untrusted control spheres; the prohibition prevents inclusion of functionality or data from such sources.
PM-30Supply Chain Risk Management StrategyPMStrategy mandates assessment of third-party components and suppliers, directly reducing inclusion of functionality from untrusted control spheres.
Show 14 more broadly-applicable controls
SA-19Component AuthenticitySAMandates acquisition only from trusted suppliers and verified authentic sources, reducing inclusion of functionality from untrusted control spheres.
SA-20Customized Development of Critical ComponentsSAReimplementing critical components avoids pulling in functionality from untrusted external control spheres.
SA-4Acquisition ProcessSAAllocation of supply-chain risk management responsibilities and vetting of the development/operational environment reduce inclusion of functionality from untrusted control spheres.
SA-6Software Usage RestrictionsSASoftware usage restrictions limit inclusion of code obtained from untrusted or non-contracted control spheres.
SA-7User-installed SoftwareSAPrevents inclusion of code or functionality obtained from an untrusted user or external source.
SA-9External System ServicesSADefining oversight, roles, and compliance monitoring for external services directly mitigates risks of including functionality from an untrusted control sphere.
SR-2Supply Chain Risk Management PlanSRThe control directly mandates assessment and mitigation of risks from external suppliers, reducing inclusion of functionality from untrusted control spheres.
SR-3Supply Chain Controls and ProcessesSRRequiring vetted sources and controls for system components prevents inclusion of functionality obtained from untrusted control spheres.
SR-4ProvenanceSRDocumenting component provenance ensures functionality is only included from verified, trusted control spheres rather than untrusted ones.
SR-5Acquisition Strategies, Tools, and MethodsSRProcurement methods and contract requirements can mandate use of vetted, controlled sources instead of arbitrary third-party or untrusted control spheres.
SR-6Supplier Assessments and ReviewsSRSupplier assessments directly reduce the likelihood of incorporating functionality from untrusted third-party control spheres.
SR-8Notification AgreementsSRAgreements establish channels for suppliers to report integrity or compromise issues in included third-party functionality, shrinking the window for exploitation.
SC-44Detonation ChambersSCIsolated execution prevents functionality from an untrusted sphere from affecting the real environment, allowing safe behavioral inspection.
SI-3Malicious Code ProtectionSIDetects and prevents inclusion of malicious functionality downloaded from untrusted control spheres.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2018-172467.69.80.93782018-12-20
CVE-2020-161527.19.80.84902021-11-14
CVE-2018-74226.97.50.90412018-03-19
CVE-2025-32463 KEV6.79.30.46972025-06-30
CVE-2021-415695.97.50.73772021-11-19
CVE-2022-254865.77.80.68832022-03-15
CVE-2023-22494.68.80.48162023-06-09
CVE-2024-82524.48.80.44152024-08-30
CVE-2025-340744.40.00.74022025-07-02
CVE-2022-371914.16.50.46372022-09-13
CVE-2022-298454.06.50.44392022-05-11
CVE-2004-02853.89.80.30002004-11-23
CVE-2022-254853.87.80.37632022-03-15
CVE-2021-218043.69.80.27812021-07-16
CVE-2020-37943.29.80.21112020-03-25
CVE-2025-276073.18.80.21762025-03-07
CVE-2022-341213.07.50.25412022-07-27
CVE-2010-20762.79.80.11952010-08-19
CVE-2024-483362.78.40.16592024-11-04
CVE-2026-07702.79.80.11862026-01-23
CVE-2021-421332.58.10.14402021-12-07
CVE-2018-83512.46.50.18752018-08-15
CVE-2004-00302.39.80.05382004-01-20
CVE-2019-135892.39.80.06122019-07-14
CVE-2023-69712.28.10.09062023-12-23