Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-546:Incomplete Data Deletion in a Multi-Tenant Environment
Attack Pattern ID:546
Version:v3.9
Attack Pattern Name:Incomplete Data Deletion in a Multi-Tenant Environment
Abstraction:Detailed
Status:Draft
Likelihood of Attack:Low
Typical Severity:Medium
DetailsContent HistoryRelated WeaknessesReports
3Weaknesses found

CWE-1266
Improper Scrubbing of Sensitive Data from Decommissioned Device
ShareView Details
Improper Scrubbing of Sensitive Data from Decommissioned Device
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in0CVEs

The product does not properly provide a capability for the product administrator to remove sensitive data at the time the product is decommissioned. A scrubbing capability could be missing, insufficient, or incorrect.

Impacts-
Read Memory
Tags-
Read Memory (impact)
As Seen In-
Not Available
CWE-1272
Sensitive Information Uncleared Before Debug/Power State Transition
ShareView Details
Sensitive Information Uncleared Before Debug/Power State Transition
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in2CVEs

The product performs a power or debug state transition, but it does not clear sensitive information that should no longer be accessible due to changes to information access restrictions.

Impacts-
Read Application DataRead Memory
Tags-
VHDLVerilogHardware Description LanguageRead Memory (impact)Read Application Data (impact)
As Seen In-
2021 CWE Most Important Hardware List
CWE-284
Improper Access Control
ShareView Details
Improper Access Control
Likelihood of Exploit-Not Available
Mapping-Discouraged
Abstraction-Pillar
Found in3785CVEs

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Impacts-
Varies by Context
Tags-
Separation of PrivilegeICS/OT (technology class)Varies by Context (impact)
As Seen In-
Research ConceptsCISQ Data Protection Measures