Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-122:Privilege Abuse
Attack Pattern ID:122
Version:v3.9
Attack Pattern Name:Privilege Abuse
Abstraction:Meta
Status:Draft
Likelihood of Attack:High
Typical Severity:Medium
DetailsContent HistoryRelated WeaknessesReports
3Weaknesses found

CWE-1317
Improper Access Control in Fabric Bridge
ShareView Details
Improper Access Control in Fabric Bridge
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in0CVEs

The product uses a fabric bridge for transactions between two Intellectual Property (IP) blocks, but the bridge does not properly perform the expected privilege, identity, or other access control checks between those IP blocks.

Impacts-
Modify MemoryBypass Protection MechanismRead MemoryDoS: Crash, Exit, or Restart
Tags-
Processor HardwareBypass Protection Mechanism (impact)Read Memory (impact)DoS: Crash, Exit, or Restart (impact)Modify Memory (impact)
As Seen In-
Not Available
CWE-269
Improper Privilege Management
ShareView Details
Improper Privilege Management
Likelihood of Exploit-Medium
Mapping-Discouraged
Abstraction-Class
Found in2386CVEs

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Impacts-
Gain Privileges or Assume Identity
Tags-
Medium exploitSeparation of PrivilegeGain Privileges or Assume Identity (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2020 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareSimplified Mapping of Published Vulnerabilities
CWE-732
Incorrect Permission Assignment for Critical Resource
ShareView Details
Incorrect Permission Assignment for Critical Resource
Likelihood of Exploit-High
Mapping-Allowed-with-Review
Abstraction-Class
Found in1476CVEs

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

Impacts-
Read Application DataOtherGain Privileges or Assume IdentityRead Files or DirectoriesModify Application Data
Tags-
High exploitEnvironment HardeningSandbox or JailCloud Computing (technology class)Other (impact)Modify Application Data (impact)Read Files or Directories (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous SoftwareCISQ Data Protection Measures2020 CWE Top 25 Most Dangerous SoftwareSimplified Mapping of Published VulnerabilitiesCWE Cross-section