Home > CAPEC List > CAPEC-546: Probe Application Memory (Version 2.11)  

CAPEC-546: Probe Application Memory

Probe Application Memory
Definition in a New Window Definition in a New Window
Attack Pattern ID: 546
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary obtains unauthorized information due to insecure or incomplete data deletion in a multi-tenant environment. If a cloud provider fails to completely delete storage and data from former cloud tenants' systems/resources, once these resources are allocated to new, potentially malicious tenants, the latter can probe the provided resources for sensitive information still there.

+ Attack Prerequisites
  • The cloud provider must not assuredly delete part or all of the sensitive data for which they are responsible.

    The adversary must have the ability to interact with the system.

+ Typical Severity


+ Typical Likelihood of Exploit

Likelihood: Low

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Low

The adversary requires the ability to traverse directory structure.

+ Solutions and Mitigations

Cloud providers should completely delete data to render it irrecoverable and inaccessible from any layer and component of infrastructure resources.

Deletion of data should be completed promptly when requested.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Read application data
A successful attack that probes application memory will compromise the confidentiality of that data.
+ References
[R.417.1] [REF-30] Kopo M. Ramokapane, Awais Rashid and Jose M. Such. "Assured Deletion in the Cloud: Requirements, Challenges and Future Directions". Association for Computing Machinery (ACM). Proceedings of the 2016 ACM on Cloud Computing Security Workshop. <https://nms.kcl.ac.uk/jose.such/pubs/Assured_deletion.pdf>.
+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Related_Attack_PatternsInternal
CAPEC Content TeamThe MITRE Corporation2017-08-04Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, References, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit, Typical_SeverityInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017