| Ambito | Impatto | Probabilità |
|---|---|---|
| Access Control Other | Gain Privileges or Assume Identity, Varies by Context Note: Exposing critical functionality essentially provides an attacker with the privilege level of that functionality. The consequences will depend on the associated functionality, but they can range from reading or modifying sensitive data, accessing administrative or other privileged functionality, or possibly even executing arbitrary code. |
| Riferimenti | Descrizione |
|---|---|
CVE-2024-11680 | File-sharing PHP product does not check if user is logged in during requests for PHP library files under an includes/ directory, allowing configuration changes, code execution, and other impacts. |
CVE-2022-31260 | Chain: a digital asset management program has an undisclosed backdoor in the legacy version of a PHP script (CWE-912) that could allow an unauthenticated user to export metadata (CWE-306) |
CVE-2022-29951 | TCP-based protocol in Programmable Logic Controller (PLC) has no authentication. |
CVE-2022-29952 | Condition Monitor firmware uses a protocol that does not require authentication. |
CVE-2022-30276 | SCADA-based protocol for bridging WAN and LAN traffic has no authentication. |
CVE-2022-30313 | Safety Instrumented System uses proprietary TCP protocols with no authentication. |
CVE-2022-30317 | Distributed Control System (DCS) uses a protocol that has no authentication. |
CVE-2021-21972 | Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV. |
CVE-2020-10263 | Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access |
CVE-2021-23147 | WiFi router does not require authentication for its UART port, allowing adversaries with physical access to execute commands as root |
CVE-2021-37415 | IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV. |
CVE-2020-13927 | Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV. |
CVE-2002-1810 | MFV. Access TFTP server without authentication and obtain configuration file with sensitive plaintext information. |
CVE-2008-6827 | Agent software running at privileges does not authenticate incoming requests over an unprotected channel, allowing a Shatter" attack. |
CVE-2004-0213 | Product enforces restrictions through a GUI but not through privileged APIs. |
CVE-2020-15483 | monitor device allows access to physical UART debug port without authentication |
CVE-2019-9201 | Programmable Logic Controller (PLC) does not have an authentication feature on its communication protocols. |
| CAPEC-ID | Nome del pattern di attacco |
|---|---|
| CAPEC-12 | Choosing Message Identifier
This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to potentially privileged information, and to possibly perpetrate other attacks through the distribution means by impersonation. If the channel/message being manipulated is an input rather than output mechanism for the system, (such as a command bus), this style of attack could be used to change the adversary's identifier to more a privileged one. |
| CAPEC-166 | Force the System to Reset Values
An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configuration of the targeted application, they may be able to reset the configuration to a prior state since many applications implement reset functions. |
| CAPEC-216 | Communication Channel Manipulation
An adversary manipulates a setting or parameter on communications channel in order to compromise its security. This can result in information exposure, insertion/removal of information from the communications stream, and/or potentially system compromise. |
| CAPEC-36 | Using Unpublished Interfaces or Functionality
An adversary searches for and invokes interfaces or functionality that the target system designers did not intend to be publicly available. If interfaces fail to authenticate requests, the attacker may be able to invoke functionality they are not authorized for. |
| CAPEC-62 | Cross Site Request Forgery
An attacker crafts malicious web links and distributes them (via web pages, email, etc.), typically in a targeted manner, hoping to induce users to click on the link and execute the malicious action against some third-party application. If successful, the action embedded in the malicious link will be processed and accepted by the targeted application with the users' privilege level. This type of attack leverages the persistence and implicit trust placed in user session cookies by many web applications today. In such an architecture, once the user authenticates to an application and a session cookie is created on the user's system, all following transactions for that session are authenticated using that cookie including potential actions initiated by an attacker and simply "riding" the existing session cookie. |
| Nome | Organizzazione | Data | Data di rilascio | Version |
|---|---|---|---|---|
| PLOVER | Draft 3 |
| Nome | Organizzazione | Data | Commento |
|---|---|---|---|
| Eric Dalci | Cigital | updated Time_of_Introduction | |
| CWE Content Team | MITRE | updated Relationships, Relationship_Notes, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, Name, Observed_Examples, Potential_Mitigations, References, Related_Attack_Patterns, Relationships | |
| CWE Content Team | MITRE | updated Common_Consequences, Potential_Mitigations, References | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations, References, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Detection_Factors, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Likelihood_of_Exploit, Modes_of_Introduction, References, Relationships | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns, Type | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Observed_Examples, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Observed_Examples, Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Demonstrative_Examples, Description, Observed_Examples, Potential_Mitigations, References, Relationship_Notes, Relationships | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships | |
| CWE Content Team | MITRE | updated References, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Mapping_Notes, Relationships | |
| CWE Content Team | MITRE | updated Observed_Examples | |
| CWE Content Team | MITRE | updated Observed_Examples | |
| CWE Content Team | MITRE | updated Common_Consequences, Description, Diagram, Modes_of_Introduction, Potential_Mitigations, Time_of_Introduction | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Observed_Examples | |
| CWE Content Team | MITRE | updated Detection_Factors, References | |
| CWE Content Team | MITRE | updated Relationships, Weakness_Ordinalities |