Prerrequisitos
An adversary has access to the file system of a system.
Mitigaciones
Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Files or Directories Accessible to External Parties The product makes files or directories accessible to unauthorized actors, even though they should not be. |
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
The MITRE Corporation |
2018-05-04 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |