CWE-528: Exposure of Core Dump File to an Unauthorized Control Sphere

Export to Word

Description

The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.

Extended Description

N/A


ThreatScore

Threat Mapped score: 1.8

Industry: Finiancial

Threat priority: P4 - Informational (Low)


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)

N/A


Attack TTPs

N/A

Modes of Introduction

Phase Note
Operation OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

N/A

Notes

← Back to CWE list