This weakness occurs when software successfully identifies an error condition but then fails to take any meaningful action to address it. The error is detected but ignored, leaving the system in an inconsistent or vulnerable state.
Imagine your code checks for a failed login attempt, a missing file, or a network timeout, but then simply logs the event and continues normal execution as if nothing went wrong. This creates a silent failure where the root problem isn't corrected, and the application might proceed using bad data, null pointers, or unstable connections. The core issue is that detection logic is present, but the crucial response—like rolling back a transaction, showing a user-friendly alert, or falling back to a secure default—is completely missing. For developers, this often stems from placeholder error handling, such as empty `catch` blocks or generic logging statements that don't trigger remediation. To fix it, every error check must have a defined outcome: terminate the operation safely, retry with limitations, notify the user appropriately, or revert to a known good state. Treating error detection as a separate step from the response action leaves critical security and stability gaps that attackers or unexpected conditions can easily exploit.
Impact: Varies by ContextUnexpected StateAlter Execution Logic
An attacker could utilize an ignored error condition to place the system in an unexpected state that could lead to the execution of unintended logic and could cause other unintended behavior.
ccc++c++javajavaMedium