Mitigations
Disallow shared content. Protect shared folders by minimizing users that have write access. Use utilities that mitigate exploitation like the Microsoft Enhanced Mitigation Experience Toolkit (EMET) to prevent exploits from being run.
Related Weaknesses
| CWE-ID |
Weakness Name |
|
Improper Access Control The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Submission
| Name |
Organization |
Date |
Date release |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Modifications
| Name |
Organization |
Date |
Comment |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |