The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Extended Description
N/A
ThreatScore
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
Observed Examples (CVEs)
No observed examples available.
Related Attack Patterns (CAPEC)
N/A
Attack TTPs
N/A
Modes of Introduction
Phase
Note
Operation
OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.
Common Consequences
Impact: Read Application Data, Read Files or Directories — Notes:
Potential Mitigations
System Configuration: Protect the core dump files from unauthorized access. (N/A)