Cyber Posture

CWE · MITRE source

CWE-912Hidden Functionality

Abstraction: Class · CVEs in our corpus: 79

The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.

Hidden functionality can take many forms, such as intentionally malicious code, "Easter Eggs" that contain extraneous functionality such as games, developer-friendly shortcuts that reduce maintenance or support costs such as hard-coded accounts, etc. From a security perspective, even when the functionality is not intentionally malicious or damaging, it can increase the product's attack surface and expose additional weaknesses beyond what is already exposed by the intended functionality. Even if it is not easily accessible, the hidden functionality could be useful for attacks that modify the control flow of the application.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (17)AI

Showing the 14 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SA-10Developer Configuration ManagementSAChange control, approval gates, and flaw tracking force hidden functionality to be either documented or discovered and removed.
SA-12Supply Chain ProtectionSAVetting and integrity controls during acquisition reduce the likelihood of hidden backdoors or malicious functionality introduced by suppliers.
SA-13TrustworthinessSAAddresses hidden functionality by mandating evidence that the system or component contains no undocumented or unauthorized capabilities that could be exploited.
SR-10Inspection of Systems or ComponentsSRInspection can reveal hidden functionality that an attacker has introduced via tampering or unauthorized modification.
SR-11Component AuthenticitySRPolicies that verify component provenance make introduction of hidden or undocumented functionality materially harder.
SR-4ProvenanceSRProvenance tracking of components reveals hidden functionality introduced via supply chain or build processes.
RA-10Threat HuntingRAHunting identifies hidden functionality used for persistence or evasion after initial compromise.
RA-6Technical Surveillance Countermeasures SurveyRATSCM surveys discover and eliminate hidden surveillance functionality that would otherwise remain undetected in the environment.
CM-8System Component InventoryCMDocumenting every system component at the required granularity and reviewing the inventory detects or prevents hidden functionality from remaining undetected.
CP-10System Recovery and ReconstitutionCPRecovery eliminates hidden functionality or backdoors introduced during compromise.
PM-30Supply Chain Risk Management StrategyPMPolicy requires supplier transparency and testing to detect hidden functionality or backdoors inserted in the supply chain.
PS-2Position Risk DesignationPSScreening high-risk technical positions lowers the probability that hidden functionality or backdoors will be added by authorized personnel.
SC-25Thin NodesSCConstrained functionality and storage surface leave little room for hidden or undocumented functionality.
SI-14Non-persistenceSIHidden or unauthorized functionality introduced at runtime cannot survive instance termination, neutralizing the value of such concealed code.
Show 3 more broadly-applicable controls
SA-20Customized Development of Critical ComponentsSACustom reimplementation prevents hidden functionality or backdoors that may exist in commercial or open-source components.
SA-21Developer ScreeningSAPersonnel screening makes it harder for an attacker to place a developer who will introduce hidden functionality or covert channels.
SR-5Acquisition Strategies, Tools, and MethodsSRSupply-chain controls such as supplier audits and functional verification requirements make insertion of hidden or undocumented functionality harder to achieve undetected.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-20439 KEV9.19.80.86312024-09-04
CVE-2010-201037.19.80.85082025-08-20
CVE-2011-100185.19.80.53002025-08-13
CVE-2021-25371 KEV3.36.10.01622021-03-26
CVE-2025-341173.00.00.50302025-07-16
CVE-2025-47729 KEV2.61.90.04152025-05-08
CVE-2020-162042.29.80.03242020-09-01
CVE-2021-248672.29.80.04762022-02-21
CVE-2024-60452.28.80.07622024-06-17
CVE-2023-401582.18.80.04972023-08-23
CVE-2024-456972.19.80.02212024-09-16
CVE-2020-125042.09.80.00552020-10-15
CVE-2021-439872.09.80.00232021-12-23
CVE-2022-32032.09.80.00372022-10-21
CVE-2022-469962.09.80.00712022-12-14
CVE-2022-469972.09.80.00712022-12-14
CVE-2022-477672.09.80.00482023-01-26
CVE-2023-241082.09.80.00562023-02-22
CVE-2024-280112.09.80.00432024-03-28
CVE-2024-55142.09.80.00232024-05-30
CVE-2024-397542.010.00.00252025-01-14
CVE-2026-35872.010.00.00132026-03-23
CVE-2026-332802.09.80.00102026-03-27
CVE-2026-19522.09.80.00052026-04-24
CVE-2026-414462.09.80.00082026-04-28