| CAPEC --> CWE Mappings Added |
| CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
| --> |
CWE-1191 |
Exposed Chip Debug and or Test Interface With Insufficient Access Control |
| --> |
CWE-1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
| --> |
CWE-1220 |
Insufficient Granularity of Access Control |
| --> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
| --> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
| --> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
| --> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
| --> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
| --> |
CWE-1268 |
Agents Included in Control Policy are not Contained in Less-Privileged Policy |
| --> |
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
| CAPEC-16 Dictionary-based Password Attack |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-26 Leveraging Race Conditions |
| --> |
CWE-1223 |
Race Condition for Write-Once Attributes |
| CAPEC-36 Using Unpublished Interfaces |
| --> |
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
| CAPEC-37 Retrieve Embedded Sensitive Data |
| --> |
CWE-226 |
Sensitive Information Uncleared in Resource Before Release for Reuse |
| --> |
CWE-1239 |
Improper Zeroization of Hardware Register |
| --> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
| --> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
| --> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
| --> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
| CAPEC-49 Password Brute Forcing |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-55 Rainbow Table Password Cracking |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-62 Cross Site Request Forgery |
| --> |
CWE-1275 |
Sensitive Cookie with Improper SameSite Attribute |
| CAPEC-66 SQL Injection |
| --> |
CWE-1286 |
Improper Validation of Syntactic Correctness of Input |
| CAPEC-70 Try Common or Default Usernames and Passwords |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-74 Manipulating State |
| --> |
CWE-1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
| --> |
CWE-1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
| --> |
CWE-1271 |
Missing Known Value on Reset for Registers Holding Security Settings |
| CAPEC-97 Cryptanalysis |
| --> |
CWE-1240 |
Use of a Risky Cryptographic Primitive |
| --> |
CWE-1241 |
Use of Predictable Algorithm in Random Number Generator |
| --> |
CWE-1279 |
Cryptographic Primitives used without Successful Self-Test |
| CAPEC-114 Authentication Abuse |
| --> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
| CAPEC-116 Excavation |
| --> |
CWE-1243 |
Exposure of Security-Sensitive Fuse Values During Debug |
| CAPEC-121 Exploit Non-Production Interfaces |
| --> |
CWE-1209 |
Failure to Disable Reserved Bits |
| CAPEC-124 Shared Resource Manipulation |
| --> |
CWE-1189 |
Improper Isolation of Shared Resources on System-on-Chip (SoC) |
| CAPEC-150 Collect Data from Common Resource Locations |
| --> |
CWE-1239 |
Improper Zeroization of Hardware Register |
| --> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
| --> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
| --> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
| CAPEC-166 Force the System to Reset Values |
| --> |
CWE-1232 |
Improper Lock Behavior After Power State Transition |
| CAPEC-176 Configuration/Environment Manipulation |
| --> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
| --> |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
| CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
| --> |
CWE-1190 |
DMA Device Enabled Too Early in Boot Phase |
| --> |
CWE-1191 |
Exposed Chip Debug and or Test Interface With Insufficient Access Control |
| --> |
CWE-1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
| --> |
CWE-1220 |
Insufficient Granularity of Access Control |
| --> |
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
| --> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
| --> |
CWE-1231 |
Improper Implementation of Lock Protection Registers |
| --> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
| --> |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
| --> |
CWE-1244 |
Improper Authorization on Physical Debug and Test Interfaces |
| --> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
| --> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
| --> |
CWE-1259 |
Improper Protection of Security Identifiers |
| --> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
| --> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
| --> |
CWE-1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
| --> |
CWE-1280 |
Access Control Check Implemented After Asset is Accessed |
| CAPEC-189 Black Box Reverse Engineering |
| --> |
CWE-203 |
Observable Discrepancy |
| CAPEC-204 Lifting Sensitive Data Embedded in Cache |
| --> |
CWE-1239 |
Improper Zeroization of Hardware Register |
| --> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
| CAPEC-212 Functionality Misuse |
| --> |
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
| --> |
CWE-1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior (Halt and Catch Fire) |
| CAPEC-233 Privilege Escalation |
| --> |
CWE-1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
| CAPEC-401 Physically Hacking Hardware |
| --> |
CWE-1263 |
Insufficient Physical Protection Mechanism |
| CAPEC-439 Manipulation During Distribution |
| --> |
CWE-1269 |
Product Released in Non-Release Configuration |
| CAPEC-508 Shoulder Surfing |
| --> |
CWE-200 |
Exposure of Sensitive Information to an Unauthorized Actor |
| --> |
CWE-359 |
Exposure of Private Personal Information to an Unauthorized Actor |
| CAPEC-509 Kerberoasting |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-521 |
Weak Password Requirements |
| --> |
CWE-522 |
Insufficiently Protected Credentials |
| CAPEC-545 Pull Data from System Resources |
| --> |
CWE-1239 |
Improper Zeroization of Hardware Register |
| --> |
CWE-1243 |
Exposure of Security-Sensitive Fuse Values During Debug |
| --> |
CWE-1258 |
Sensitive Information Uncleared During Hardware Debug Flows |
| --> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
| --> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
| --> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
| CAPEC-546 Probe Application Memory |
| --> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
| --> |
CWE-1272 |
Debug/Power State Transitions Leak Information |
| CAPEC-555 Remote Services with Stolen Credentials |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-521 |
Weak Password Requirements |
| CAPEC-560 Use of Known Domain Credentials |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| --> |
CWE-1273 |
Device Unlock Credential Sharing |
| CAPEC-561 Windows Admin Shares with Stolen Credentials |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-521 |
Weak Password Requirements |
| CAPEC-565 Password Spraying |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-521 |
Weak Password Requirements |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-600 Credential Stuffing |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-522 |
Insufficiently Protected Credentials |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-624 Hardware Fault Injection |
| --> |
CWE-1247 |
Missing Protection Against Voltage and Clock Glitches |
| --> |
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
| --> |
CWE-1256 |
Hardware Features Enable Physical Attacks from Software |
| CAPEC-644 Use of Captured Hashes (Pass The Hash) |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-836 |
Use of Password Hash Instead of Password for Authentication |
| CAPEC-645 Use of Captured Tickets (Pass The Ticket) |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| CAPEC-652 Use of Known Kerberos Credentials |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-522 |
Insufficiently Protected Credentials |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| --> |
CWE-836 |
Use of Password Hash Instead of Password for Authentication |
| CAPEC-653 Use of Known Windows Credentials |
| --> |
CWE-262 |
Not Using Password Aging |
| --> |
CWE-263 |
Password Aging with Long Expiration |
| --> |
CWE-307 |
Improper Restriction of Excessive Authentication Attempts |
| --> |
CWE-308 |
Use of Single-factor Authentication |
| --> |
CWE-309 |
Use of Password System for Primary Authentication |
| --> |
CWE-522 |
Insufficiently Protected Credentials |
| --> |
CWE-654 |
Reliance on a Single Factor in a Security Decision |
| CAPEC-654 Credential Prompt Impersonation |
| --> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
| CAPEC --> CAPEC Mappings Added |
| CAPEC-16 Dictionary-based Password Attack |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-49 Password Brute Forcing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-50 Password Recovery Exploitation |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-55 Rainbow Table Password Cracking |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-70 Try Common or Default Usernames and Passwords |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-85 AJAX Fingerprinting |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
| CAPEC-110 SQL Injection through SOAP Parameter Tampering |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
| CAPEC-225 Subvert Access Control |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-228 DTD Injection |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
| CAPEC-508 Shoulder Surfing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
Has Child --> |
CAPEC-651 |
Eavesdropping |
| CAPEC-509 Kerberoasting |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-652 |
Use of Known Kerberos Credentials |
| CAPEC-513 Software |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-514 Physical Security |
|
Has Member --> |
CAPEC-117 |
Interception |
| CAPEC-515 Hardware |
|
Has Member --> |
CAPEC-26 |
Leveraging Race Conditions |
|
Has Member --> |
CAPEC-74 |
Manipulating State |
|
Has Member --> |
CAPEC-113 |
API Manipulation |
|
Has Member --> |
CAPEC-114 |
Authentication Abuse |
|
Has Member --> |
CAPEC-116 |
Excavation |
|
Has Member --> |
CAPEC-122 |
Privilege Abuse |
|
Has Member --> |
CAPEC-124 |
Shared Resource Manipulation |
|
Has Member --> |
CAPEC-161 |
Infrastructure Manipulation |
|
Has Member --> |
CAPEC-176 |
Configuration/Environment Manipulation |
|
Has Member --> |
CAPEC-188 |
Reverse Engineering |
|
Has Member --> |
CAPEC-192 |
Protocol Analysis |
|
Has Member --> |
CAPEC-212 |
Functionality Misuse |
|
Has Member --> |
CAPEC-233 |
Privilege Escalation |
|
Has Member --> |
CAPEC-439 |
Manipulation During Distribution |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-555 Remote Services with Stolen Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
| CAPEC-560 Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
| CAPEC-561 Windows Admin Shares with Stolen Credentials |
|
CanFollow --> |
CAPEC-16 |
Dictionary-based Password Attack |
|
CanFollow --> |
CAPEC-49 |
Password Brute Forcing |
|
CanFollow --> |
CAPEC-50 |
Password Recovery Exploitation |
|
CanFollow --> |
CAPEC-55 |
Rainbow Table Password Cracking |
|
CanFollow --> |
CAPEC-70 |
Try Common or Default Usernames and Passwords |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-165 |
File Manipulation |
|
CanPrecede --> |
CAPEC-545 |
Pull Data from System Resources |
|
CanPrecede --> |
CAPEC-549 |
Local Execution of Code |
|
CanFollow --> |
CAPEC-565 |
Password Spraying |
|
CanFollow --> |
CAPEC-568 |
Capture Credentials via Keylogger |
|
Has Child --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-565 Password Spraying |
|
Has Child --> |
CAPEC-49 |
Password Brute Forcing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-568 Capture Credentials via Keylogger |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-600 Credential Stuffing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
CanPrecede --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-644 Use of Captured Hashes (Pass The Hash) |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-165 |
File Manipulation |
|
CanPrecede --> |
CAPEC-545 |
Pull Data from System Resources |
|
CanPrecede --> |
CAPEC-549 |
Local Execution of Code |
|
Has Child --> |
CAPEC-653 |
Use of Known Windows Credentials |
| CAPEC-645 Use of Captured Tickets (Pass The Ticket) |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-652 |
Use of Known Kerberos Credentials |
| CAPEC-652 Use of Known Kerberos Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanFollow --> |
CAPEC-157 |
Sniffing Attacks |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-653 Use of Known Windows Credentials |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-654 Credential Prompt Impersonation |
|
Has Child --> |
CAPEC-504 |
Task Impersonation |
| CAPEC-655 Avoid Security Tool Identification by Adding Data |
|
Has Child --> |
CAPEC-572 |
Artificially Inflate File Sizes |