This vulnerability occurs when a program fails to properly close or release a system resource—like a file handle, database connection, or memory block—after it's no longer needed, preventing its reuse.
Developers must actively manage a resource's entire lifecycle, from allocation to release. This means ensuring cleanup happens not just in the main success path, but also in every possible error or exception scenario. Missing a single code path can leave resources permanently locked, leading to gradual performance degradation or sudden application crashes. Tracking these leaks across complex, distributed systems is challenging. While SAST tools can flag the pattern, Plexicus uses AI to analyze context and suggest precise code fixes—such as adding finally blocks or implementing try-with-resources—automating remediation and saving hours of manual debugging.
Impact: DoS: Resource Consumption (Other)Varies by Context
Most unreleased resource issues result in general software reliability problems, but if an attacker can intentionally trigger a resource leak, the attacker might be able to launch a denial of service attack by depleting the resource pool.
Impact: Read Application Data
When a resource containing sensitive information is not correctly shutdown, it may expose the sensitive data in a subsequent allocation.
Strategy: Language Selection
javajavajavac#cc++c++Medium