[Identify Target] Attacker identifies client components to extract information from. These may be binary executables, class files, shared libraries (e.g., DLLs), configuration files, or other system files.
[Retrieve Embedded Data] The attacker then uses a variety of techniques, such as sniffing, reverse-engineering, and cryptanalysis to retrieve the information of interest.
Weakness Name | |
---|---|
CWE-226 |
Sensitive Information in Resource Not Removed Before Reuse The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities. |
CWE-311 |
Missing Encryption of Sensitive Data The product does not encrypt sensitive or critical information before storage or transmission. |
CWE-525 |
Use of Web Browser Cache Containing Sensitive Information The web application does not use an appropriate caching policy that specifies the extent to which each web page and associated form fields should be cached. |
CWE-312 |
Cleartext Storage of Sensitive Information The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere. |
CWE-314 |
Cleartext Storage in the Registry The product stores sensitive information in cleartext in the registry. |
CWE-315 |
Cleartext Storage of Sensitive Information in a Cookie The product stores sensitive information in cleartext in a cookie. |
CWE-318 |
Cleartext Storage of Sensitive Information in Executable The product stores sensitive information in cleartext in an executable. |
CWE-1239 |
Improper Zeroization of Hardware Register The hardware product does not properly clear sensitive information from built-in registers when the user of the hardware block changes. |
CWE-1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information The hardware does not fully clear security-sensitive values, such as keys and intermediate values in cryptographic operations, when debug mode is entered. |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device The product does not properly provide a capability for the product administrator to remove sensitive data at the time the product is decommissioned. A scrubbing capability could be missing, insufficient, or incorrect. |
CWE-1272 |
Sensitive Information Uncleared Before Debug/Power State Transition The product performs a power or debug state transition, but it does not clear sensitive information that should no longer be accessible due to changes to information access restrictions. |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques Information stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the integrated circuit using techniques such as scanning electron microscopy. |
CWE-1301 |
Insufficient or Incomplete Data Removal within Hardware Component The product's data removal process does not completely delete all data and potentially sensitive information within hardware components. |
CWE-1330 |
Remanent Data Readable after Memory Erase Confidential information stored in memory circuits is readable or recoverable after being cleared or erased. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Activation_Zone, Attack_Phases, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Vulnerabilities, Resources_Required | |
CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow, Related_Weaknesses, Taxonomy_Mappings | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow | |
CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings |