CAPEC --> CWE Mappings Added |
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
--> |
CWE-1191 |
Exposed Chip Debug and or Test Interface With Insufficient Access Control |
--> |
CWE-1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
--> |
CWE-1220 |
Insufficient Granularity of Access Control |
--> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
--> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
--> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
--> |
CWE-1268 |
Agents Included in Control Policy are not Contained in Less-Privileged Policy |
--> |
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
CAPEC-16 Dictionary-based Password Attack |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-26 Leveraging Race Conditions |
--> |
CWE-1223 |
Race Condition for Write-Once Attributes |
CAPEC-36 Using Unpublished Interfaces |
--> |
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
CAPEC-37 Retrieve Embedded Sensitive Data |
--> |
CWE-226 |
Sensitive Information Uncleared in Resource Before Release for Reuse |
--> |
CWE-1239 |
Improper Zeroization of Hardware Register |
--> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
--> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
--> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
--> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
CAPEC-49 Password Brute Forcing |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-55 Rainbow Table Password Cracking |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-62 Cross Site Request Forgery |
--> |
CWE-1275 |
Sensitive Cookie with Improper SameSite Attribute |
CAPEC-66 SQL Injection |
--> |
CWE-1286 |
Improper Validation of Syntactic Correctness of Input |
CAPEC-70 Try Common or Default Usernames and Passwords |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-74 Manipulating State |
--> |
CWE-1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
--> |
CWE-1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
--> |
CWE-1271 |
Missing Known Value on Reset for Registers Holding Security Settings |
CAPEC-97 Cryptanalysis |
--> |
CWE-1240 |
Use of a Risky Cryptographic Primitive |
--> |
CWE-1241 |
Use of Predictable Algorithm in Random Number Generator |
--> |
CWE-1279 |
Cryptographic Primitives used without Successful Self-Test |
CAPEC-114 Authentication Abuse |
--> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
CAPEC-116 Excavation |
--> |
CWE-1243 |
Exposure of Security-Sensitive Fuse Values During Debug |
CAPEC-121 Exploit Non-Production Interfaces |
--> |
CWE-1209 |
Failure to Disable Reserved Bits |
CAPEC-124 Shared Resource Manipulation |
--> |
CWE-1189 |
Improper Isolation of Shared Resources on System-on-Chip (SoC) |
CAPEC-150 Collect Data from Common Resource Locations |
--> |
CWE-1239 |
Improper Zeroization of Hardware Register |
--> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
--> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
--> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
CAPEC-166 Force the System to Reset Values |
--> |
CWE-1232 |
Improper Lock Behavior After Power State Transition |
CAPEC-176 Configuration/Environment Manipulation |
--> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
--> |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
--> |
CWE-1190 |
DMA Device Enabled Too Early in Boot Phase |
--> |
CWE-1191 |
Exposed Chip Debug and or Test Interface With Insufficient Access Control |
--> |
CWE-1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
--> |
CWE-1220 |
Insufficient Granularity of Access Control |
--> |
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
--> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
--> |
CWE-1231 |
Improper Implementation of Lock Protection Registers |
--> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
--> |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
--> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
--> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1259 |
Improper Protection of Security Identifiers |
--> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
--> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
--> |
CWE-1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
--> |
CWE-1280 |
Access Control Check Implemented After Asset is Accessed |
CAPEC-189 Black Box Reverse Engineering |
--> |
CWE-203 |
Observable Discrepancy |
CAPEC-204 Lifting Sensitive Data Embedded in Cache |
--> |
CWE-1239 |
Improper Zeroization of Hardware Register |
--> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
CAPEC-212 Functionality Misuse |
--> |
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
--> |
CWE-1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior (Halt and Catch Fire) |
CAPEC-233 Privilege Escalation |
--> |
CWE-1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
CAPEC-401 Physically Hacking Hardware |
--> |
CWE-1263 |
Insufficient Physical Protection Mechanism |
CAPEC-439 Manipulation During Distribution |
--> |
CWE-1269 |
Product Released in Non-Release Configuration |
CAPEC-508 Shoulder Surfing |
--> |
CWE-200 |
Exposure of Sensitive Information to an Unauthorized Actor |
--> |
CWE-359 |
Exposure of Private Personal Information to an Unauthorized Actor |
CAPEC-509 Kerberoasting |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-521 |
Weak Password Requirements |
--> |
CWE-522 |
Insufficiently Protected Credentials |
CAPEC-545 Pull Data from System Resources |
--> |
CWE-1239 |
Improper Zeroization of Hardware Register |
--> |
CWE-1243 |
Exposure of Security-Sensitive Fuse Values During Debug |
--> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
--> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
--> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
--> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
CAPEC-546 Probe Application Memory |
--> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
--> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
CAPEC-555 Remote Services with Stolen Credentials |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-521 |
Weak Password Requirements |
CAPEC-560 Use of Known Domain Credentials |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
--> |
CWE-1273 |
Device Unlock Credential Sharing |
CAPEC-561 Windows Admin Shares with Stolen Credentials |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-521 |
Weak Password Requirements |
CAPEC-565 Password Spraying |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-521 |
Weak Password Requirements |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-600 Credential Stuffing |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-522 |
Insufficiently Protected Credentials |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-624 Hardware Fault Injection |
--> |
CWE-1247 |
Missing Protection Against Voltage and Clock Glitches |
--> |
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
--> |
CWE-1256 |
Hardware Features Enable Physical Attacks from Software |
CAPEC-644 Use of Captured Hashes (Pass The Hash) |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-836 |
Use of Password Hash Instead of Password for Authentication |
CAPEC-645 Use of Captured Tickets (Pass The Ticket) |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-308 |
Use of Single-factor Authentication |
CAPEC-652 Use of Known Kerberos Credentials |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-522 |
Insufficiently Protected Credentials |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
--> |
CWE-836 |
Use of Password Hash Instead of Password for Authentication |
CAPEC-653 Use of Known Windows Credentials |
--> |
CWE-262 |
Not Using Password Aging |
--> |
CWE-263 |
Password Aging with Long Expiration |
--> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
--> |
CWE-308 |
Use of Single-factor Authentication |
--> |
CWE-309 |
Use of Password System for Primary Authentication |
--> |
CWE-522 |
Insufficiently Protected Credentials |
--> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
CAPEC-654 Credential Prompt Impersonation |
--> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
CAPEC --> CAPEC Mappings Added |
CAPEC-16 Dictionary-based Password Attack |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-49 Password Brute Forcing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-50 Password Recovery Exploitation |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-55 Rainbow Table Password Cracking |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-70 Try Common or Default Usernames and Passwords |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-85 AJAX Fingerprinting |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
CAPEC-110 SQL Injection through SOAP Parameter Tampering |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
CAPEC-225 Subvert Access Control |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-228 DTD Injection |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
CAPEC-508 Shoulder Surfing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
Has Child --> |
CAPEC-651 |
Eavesdropping |
CAPEC-509 Kerberoasting |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-652 |
Use of Known Kerberos Credentials |
CAPEC-513 Software |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-514 Physical Security |
|
Has Member --> |
CAPEC-117 |
Interception |
CAPEC-515 Hardware |
|
Has Member --> |
CAPEC-26 |
Leveraging Race Conditions |
|
Has Member --> |
CAPEC-74 |
Manipulating State |
|
Has Member --> |
CAPEC-113 |
API Manipulation |
|
Has Member --> |
CAPEC-114 |
Authentication Abuse |
|
Has Member --> |
CAPEC-116 |
Excavation |
|
Has Member --> |
CAPEC-122 |
Privilege Abuse |
|
Has Member --> |
CAPEC-124 |
Shared Resource Manipulation |
|
Has Member --> |
CAPEC-161 |
Infrastructure Manipulation |
|
Has Member --> |
CAPEC-176 |
Configuration/Environment Manipulation |
|
Has Member --> |
CAPEC-188 |
Reverse Engineering |
|
Has Member --> |
CAPEC-192 |
Protocol Analysis |
|
Has Member --> |
CAPEC-212 |
Functionality Misuse |
|
Has Member --> |
CAPEC-233 |
Privilege Escalation |
|
Has Member --> |
CAPEC-439 |
Manipulation During Distribution |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-555 Remote Services with Stolen Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
CAPEC-560 Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
CAPEC-561 Windows Admin Shares with Stolen Credentials |
|
CanFollow --> |
CAPEC-16 |
Dictionary-based Password Attack |
|
CanFollow --> |
CAPEC-49 |
Password Brute Forcing |
|
CanFollow --> |
CAPEC-50 |
Password Recovery Exploitation |
|
CanFollow --> |
CAPEC-55 |
Rainbow Table Password Cracking |
|
CanFollow --> |
CAPEC-70 |
Try Common or Default Usernames and Passwords |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-165 |
File Manipulation |
|
CanPrecede --> |
CAPEC-545 |
Pull Data from System Resources |
|
CanPrecede --> |
CAPEC-549 |
Local Execution of Code |
|
CanFollow --> |
CAPEC-565 |
Password Spraying |
|
CanFollow --> |
CAPEC-568 |
Capture Credentials via Keylogger |
|
Has Child --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-565 Password Spraying |
|
Has Child --> |
CAPEC-49 |
Password Brute Forcing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-568 Capture Credentials via Keylogger |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-600 Credential Stuffing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-644 Use of Captured Hashes (Pass The Hash) |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-165 |
File Manipulation |
|
CanPrecede --> |
CAPEC-545 |
Pull Data from System Resources |
|
CanPrecede --> |
CAPEC-549 |
Local Execution of Code |
|
Has Child --> |
CAPEC-653 |
Use of Known Windows Credentials |
CAPEC-645 Use of Captured Tickets (Pass The Ticket) |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-652 |
Use of Known Kerberos Credentials |
CAPEC-652 Use of Known Kerberos Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanFollow --> |
CAPEC-157 |
Sniffing Attacks |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-653 Use of Known Windows Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-654 Credential Prompt Impersonation |
|
Has Child --> |
CAPEC-504 |
Task Impersonation |
CAPEC-655 Avoid Security Tool Identification by Adding Data |
|
Has Child --> |
CAPEC-572 |
Artificially Inflate File Sizes |