Conditions préalables
An authoritative or reputable signer is storing their private signature key with insufficient protection.
Compétences requises
Knowledge of common location methods and access methods to sensitive data
Ability to compromise systems containing sensitive data
Atténuations
Restrict access to private keys from non-supervisory accounts
Restrict access to administrative personnel and processes only
Ensure all remote methods are secured
Ensure all services are patched and up to date
Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
|
Insufficiently Protected Credentials The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Références
REF-411
Security breach stopped
Sigbjørn Vik.
REF-412
Bit9 and Our Customers’ Security
Patrick Morley.
REF-413
Inappropriate Use of Adobe Code Signing Certificate
Brad Arkin.
Soumission
Nom |
Organisation |
Date |
Date de publication |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Nom |
Organisation |
Date |
Commentaire |
CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Mitigations |
CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |