Prerequisites
An adversary has access to the file system of a system.
Mitigations
Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Files or Directories Accessible to External Parties The product makes files or directories accessible to unauthorized actors, even though they should not be. |
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2018-05-04 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |
CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |