Voraussetzungen
An adversary has access to the file system of a system.
Gegenmaßnahmen
Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Files or Directories Accessible to External Parties The product makes files or directories accessible to unauthorized actors, even though they should not be. |
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2018-05-04 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |