CWE-436

Interpretation Conflict

Weakness Description

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.

Common Consequences

IntegrityOther
Unexpected StateVaries by Context
Advertisement

Related Weaknesses