Prerequisites
The adversary needs either physical or remote access to the victim system.
Skills Required
The adversary needs to be able to infect the victim system in a manner that gives them remote access.
If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices.
Mitigations
Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
|
2018-07-31 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated @Abstraction |
CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Skills_Required |