CAPEC-639 Metadata
Likelihood of Attack
Low
Typical Severity
Medium
Overview
Summary
An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Prerequisites
An adversary has access to the file system of a system.
Potential Solutions / Mitigations
Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-552 | Files or Directories Accessible to External Parties |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-545 | An adversary who is authorized or has the ability to search known system resources, does so with the intention of gathering useful information. System resources include files, memory, and other aspects of the target system. In this pattern of attack, the adversary does not necessarily know what they are going to find when they start pulling data. This is different than CAPEC-150 where the adversary knows what they are looking for due to the common location. |
Taxonomy Mappings
Taxonomy: ATTACK
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.