CWE-284: Improper Access Control
ID
CWE-284
Abstraction
Pillar
Structure
Simple
Status
Incomplete
Number of CVEs
2600
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Access control involves the use of several protection mechanisms such as:
- Authentication (proving the identity of an actor)
- Authorization (ensuring that a given actor can access a resource), and
- Accountability (tracking of activities that were performed)
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc.
There are two distinct behaviors that can introduce access control weaknesses:
- Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for either the user or the resource (for example, setting a password file to be world-writable, or giving administrator capabilities to a guest user). This action could be performed by the program or the administrator.
- Enforcement: the mechanism contains errors that prevent it from properly enforcing the specified access control requirements (e.g., allowing the user to specify their own privileges, or allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs within the program itself, in that it does not actually enforce the intended security policy that the administrator specifies.
Modes of Introduction
Phase | Note |
---|---|
Architecture and Design | |
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Operation |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Technology | Not Technology-Specific | ||
Technology | ICS/OT |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.org# ID | Name | Weaknesses |
---|---|---|
CAPEC-19 | Embedding Scripts within Scripts | CWE-284 |
CAPEC-441 | Malicious Logic Insertion | CWE-284 |
CAPEC-478 | Modification of Windows Service Configuration | CWE-284 |
CAPEC-479 | Malicious Root Certificate | CWE-284 |
CAPEC-502 | Intent Spoof | CWE-284 |
CAPEC-503 | WebView Exposure | CWE-284 |
CAPEC-536 | Data Injected During Configuration | CWE-284 |
CAPEC-546 | Incomplete Data Deletion in a Multi-Tenant Environment | CWE-284 |
CAPEC-550 | Install New Service | CWE-284 |
CAPEC-551 | Modify Existing Service | CWE-284 |
CAPEC-552 | Install Rootkit | CWE-284 |
CAPEC-556 | Replace File Extension Handlers | CWE-284 |
CAPEC-558 | Replace Trusted Executable | CWE-284 |
CAPEC-562 | Modify Shared File | CWE-284 |
CAPEC-563 | Add Malicious File to Shared Webroot | CWE-284 |
CAPEC-564 | Run Software at Logon | CWE-284 |
CAPEC-578 | Disable Security Software | CWE-284 |
CVEs Published
CVSS Severity
CVSS Severity - By Year
CVSS Base Score
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |
Loading...