Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1262:Improper Access Control for Register Interface
Weakness ID:1262
Version:v4.17
Weakness Name:Improper Access Control for Register Interface
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Stable
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Submissions
Submission DateRelease DateSubmitterOrganizationVersionComment
2020-05-082020-02-24Nicole FernCycuity (originally submitted as Tortuga Logic)4.1

N/A

Submission Date: 2020-05-08

Release Date: 2020-02-24

Submitter: Nicole Fern

Organization: Cycuity (originally submitted as Tortuga Logic)

Version: 4.1

Comment:

N/A

▼Modifications
Modification DateRelease DateModifierOrganizationVersionImportanceComment
2020-08-20N/ACWE Content TeamMITREN/AN/A

updated Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns

2021-10-28N/ACWE Content TeamMITREN/AN/A

updated Description, Detection_Factors, Name, Observed_Examples, Potential_Mitigations, Weakness_Ordinalities

2022-04-28N/ACWE Content TeamMITREN/AN/A

updated Related_Attack_Patterns

2023-04-27N/ACWE Content TeamMITREN/AN/A

updated Relationships

2023-06-29N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples, Mapping_Notes, References

2023-10-26N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples

Modification Date: 2020-08-20

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns

Modification Date: 2021-10-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Description, Detection_Factors, Name, Observed_Examples, Potential_Mitigations, Weakness_Ordinalities

Modification Date: 2022-04-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Related_Attack_Patterns

Modification Date: 2023-04-27

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Relationships

Modification Date: 2023-06-29

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples, Mapping_Notes, References

Modification Date: 2023-10-26

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples

▼Contributions
Contributor DateRelease DateTypeContributorOrganizationVersionComment
2021-10-11N/AContentAnders Nordstrom, Alric AlthoffCycuity (originally submitted as Tortuga Logic)N/A

Provided detection methods and observed examples

2021-10-12N/AContentNicole FernRiscureN/A

Provided detection methods

2023-06-21N/AContentShaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza SadeghiTechnical University of DarmstadtN/A

suggested demonstrative example

2023-06-21N/AContentRahul Kande, Chen Chen, Jeyavijayan RajendranTexas A&M UniversityN/A

suggested demonstrative example

Contributor Date: 2021-10-11

Release Date: N/A

Type: Content

Contributor: Anders Nordstrom, Alric Althoff

Organization: Cycuity (originally submitted as Tortuga Logic)

Version: N/A

Comment:

Provided detection methods and observed examples

Contributor Date: 2021-10-12

Release Date: N/A

Type: Content

Contributor: Nicole Fern

Organization: Riscure

Version: N/A

Comment:

Provided detection methods

Contributor Date: 2023-06-21

Release Date: N/A

Type: Content

Contributor: Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi

Organization: Technical University of Darmstadt

Version: N/A

Comment:

suggested demonstrative example

Contributor Date: 2023-06-21

Release Date: N/A

Type: Content

Contributor: Rahul Kande, Chen Chen, Jeyavijayan Rajendran

Organization: Texas A&M University

Version: N/A

Comment:

suggested demonstrative example

▼Previous Name Entries
Change DatePrevious Entry NameVersion
2021-10-28

Register Interface Allows Software Access to Sensitive Data or Security Settings

N/A

Change Date: 2021-10-28

Version: N/A

Previous Entry Name: Register Interface Allows Software Access to Sensitive Data or Security Settings