CWE-1327 - Binding to an Unrestricted IP Address
- Abstraction:Base
- Structure:Simple
- Status:Incomplete
- Release Date:2020-12-10
- Latest Modification Date:2023-10-26
Weakness Name
Binding to an Unrestricted IP Address
Description
The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that communicates remotely.
When a server binds to the address 0.0.0.0, it allows connections from every IP address on the local machine, effectively exposing the server to every possible network. This might be much broader access than intended by the developer or administrator, who might only be expecting the server to be reachable from a single interface/network.
Common Consequences
Scope: Availability
Impact: DoS: Amplification
Related Weaknesses
Oracle denies breach after hacker claims theft of 6 million data records
Oracle Health breach compromises patient data at US hospitals
Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
CosmicSting flaw impacts 75% of Adobe Commerce, Magento sites
CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825)
RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
Employee charged with stealing unreleased movies, sharing them online
CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability
CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
CVE-2019-9874 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2019-9875 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2025-30154 reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability
CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
HighPath Traversal
InformationalEmail address found in WebSocket message
HighXPath Injection
CWE-1281 Sequence of Processor Instructions Leads to Unexpected Behavior
CWE-1070 Serializable Data Element Containing non-Serializable Item Elements
LowCWE-296 Improper Following of a Certificate's Chain of Trust
CWE-1315 Improper Setting of Bus Controlling Capability in Fabric End-point
CWE-554 ASP.NET Misconfiguration: Not Using Input Validation Framework
CWE-1322 Use of Blocking Code in Single-threaded, Non-blocking Context