CWE-15: External Control of System or Configuration Setting
ID
CWE-15
Abstraction
Base
Structure
Simple
Status
Incomplete
Number of CVEs
16
One or more system settings or configuration elements can be externally controlled by a user.
Allowing external control of system settings can disrupt service or cause an application to behave in unexpected, and potentially malicious ways.
Modes of Introduction
Phase | Note |
---|---|
Implementation | Setting manipulation vulnerabilities occur when an attacker can control values that govern the behavior of the system, manage specific resources, or in some way affect the functionality of the application. |
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Technology | Not Technology-Specific | ||
Technology | ICS/OT |
Relationships
View | Weakness | |||||||
---|---|---|---|---|---|---|---|---|
# ID | View | Status | # ID | Name | Abstraction | Structure | Status | |
CWE-1000 | Research Concepts | Draft | CWE-642 | External Control of Critical State Data | Class | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-610 | Externally Controlled Reference to a Resource in Another Sphere | Class | Simple | Draft | |
CWE-700 | Seven Pernicious Kingdoms | Incomplete | CWE-20 | Improper Input Validation | Class | Simple | Stable |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.org# ID | Name | Weaknesses |
---|---|---|
CAPEC-13 | Subverting Environment Variable Values | CWE-15 |
CAPEC-69 | Target Programs with Elevated Privileges | CWE-15 |
CAPEC-76 | Manipulating Web Input to File System Calls | CWE-15 |
CAPEC-77 | Manipulating User-Controlled Variables | CWE-15 |
CAPEC-146 | XML Schema Poisoning | CWE-15 |
CAPEC-176 | Configuration/Environment Manipulation | CWE-15 |
CAPEC-203 | Manipulate Registry Information | CWE-15 |
CAPEC-270 | Modification of Registry Run Keys | CWE-15 |
CAPEC-271 | Schema Poisoning | CWE-15 |
CAPEC-579 | Replace Winlogon Helper DLL | CWE-15 |
CVEs Published
CVSS Severity
CVSS Severity - By Year
CVSS Base Score
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |
Loading...