CWE-528
Exposure of Core Dump File to an Unauthorized Control Sphere
AI Translation Available
The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Status
draft
Abstraction
variant
Affected Platforms
Technical Details
AI Translation
Common Consequences
confidentiality
Impacts
read application data
read files or directories
Detection Methods
automated static analysis
Potential Mitigations
Phases:
system configuration
Descriptions:
•
Protect the core dump files from unauthorized access.