CWE-528

Exposure of Core Dump File to an Unauthorized Control Sphere
AI Translation Available

The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.

Status
draft
Abstraction
variant

Common Consequences

confidentiality
Impacts
read application data read files or directories

Detection Methods

automated static analysis

Potential Mitigations

Phases:
system configuration
Descriptions:
• Protect the core dump files from unauthorized access.