Prerequisites
The adversary must know the location of these common key files.
Mitigations
Leverage file protection mechanisms to render these files accessible only to authorized parties.
Related Weaknesses
| CWE-ID |
Weakness Name |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Submission
| Name |
Organization |
Date |
Date release |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
|
Modifications
| Name |
Organization |
Date |
Comment |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Resources_Required |