CAPEC 639 Probe System Files

Stable Detailed Unknown Risk
Severity Medium

Description

An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

5