Known Exploited Vulnerabilities Improper Access Control Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2021-26085 Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability primary_impact T1005 Data from Local System
Comments
This vulnerability allows viewing of restricted resources via a pre-authorization arbitrary file read vulnerability.
References
CVE-2019-11510 Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability secondary_impact T1083 File and Directory Discovery
Comments
CVE 2019-11510 Pulse Secure Connect is vulnerable to unauthenticated arbitrary file disclosure. An attacker can exploit this vulnerability to gain access to administrative credentials.
References
CVE-2019-11510 Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability secondary_impact T1552.001 Credentials In Files
Comments
CVE 2019-11510 Pulse Secure Connect is vulnerable to unauthenticated arbitrary file disclosure. An attacker can exploit this vulnerability to gain access to administrative credentials.
References
CVE-2019-11510 Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE 2019-11510 Pulse Secure Connect is vulnerable to unauthenticated arbitrary file disclosure. An attacker can exploit this vulnerability to gain access to administrative credentials.
References
CVE-2019-11510 Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE 2019-11510 Pulse Secure Connect is vulnerable to unauthenticated arbitrary file disclosure. An attacker can exploit this vulnerability to gain access to administrative credentials.
References
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2019-1653 is a critical information disclosure vulnerability affecting Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers. This vulnerability allows unauthenticated, remote attackers to access sensitive information from affected devices.
References
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability secondary_impact T1007 System Service Discovery
Comments
CVE-2019-1653 is a critical information disclosure vulnerability affecting Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers. This vulnerability allows unauthenticated, remote attackers to access sensitive information from affected devices.
References
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability primary_impact T1082 System Information Discovery
Comments
CVE-2019-1653 is a critical information disclosure vulnerability affecting Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers. This vulnerability allows unauthenticated, remote attackers to access sensitive information from affected devices.
References
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2019-1653 is a critical information disclosure vulnerability affecting Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers. This vulnerability allows unauthenticated, remote attackers to access sensitive information from affected devices.
References
CVE-2009-3960 Adobe BlazeDS Information Disclosure Vulnerability primary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited through an XML injection or XML external entity injection. In-the-wild reporting indicates adversaries have used this exploit to establish a web shell on a victim machine. This adversary took actions to cover their tracks, establish persistence, exfiltrate Registry data, escalated privileges, moved laterally, disabled security software, installed and ran ransomware.
References
CVE-2009-3960 Adobe BlazeDS Information Disclosure Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through an XML injection or XML external entity injection. In-the-wild reporting indicates adversaries have used this exploit to establish a web shell on a victim machine. This adversary took actions to cover their tracks, establish persistence, exfiltrate Registry data, escalated privileges, moved laterally, disabled security software, installed and ran ransomware.
References
CVE-2013-0631 Adobe ColdFusion Information Disclosure Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited via a public-facing application. The adversary can use this vulnerability to gain access to victim host information.
References
CVE-2013-0631 Adobe ColdFusion Information Disclosure Vulnerability primary_impact T1592 Gather Victim Host Information
Comments
This vulnerability is exploited via a public-facing application. The adversary can use this vulnerability to gain access to victim host information.
References
CVE-2023-38205 Adobe ColdFusion Improper Access Control Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2023-38205 is a vulnerability that is the result of an incomplete patch of CVE-2023-29298. An adversary remains able to exploit the public-facing application as a result of this vulnerability.
References
CVE-2023-29298 Adobe ColdFusion Improper Access Control Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is used by exploited a public-facing application by exploiting a flaw in URL path validation.
References
CVE-2020-8195 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability exploitation_technique T1056 Input Capture
Comments
CVE-2020-8195 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2020-8195 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability primary_impact T1082 System Information Discovery
Comments
CVE-2020-8195 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2020-8195 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability primary_impact T1005 Data from Local System
Comments
CVE-2020-8195 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2020-8196 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability exploitation_technique T1056 Input Capture
Comments
CVE-2020-8196 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2020-8196 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability primary_impact T1082 System Information Discovery
Comments
CVE-2020-8196 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2020-8196 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2020-8196 is an information disclosure in Citrix ADC, Gateway, and SD-WAN WANOP Appliance which allows attacker to access sensitive information via crafted requests.
References
CVE-2021-40655 D-Link DIR-605 Router Information Disclosure Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited when an adversary forges a post request to the / get cfg.php page. The POST request could enable the adversary to obtain username and password information on the router.
References
CVE-2021-26085 Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability allows viewing of restricted resources via a pre-authorization arbitrary file read vulnerability.
References
CVE-2023-22518 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability secondary_impact T1105 Ingress Tool Transfer
Comments
CVE-2023-22518 is an improper authorization vulnerability. Adversaries have been seen using HTTP POST requests to upload maliciously-crafted zip files to Confluence WebServers to exploit this vulnerability. After exploitation, adversaries were observed doing local system information discovery, downloading malicious payloads,
References
CVE-2023-22518 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability primary_impact T1033 System Owner/User Discovery
Comments
CVE-2023-22518 is an improper authorization vulnerability. Adversaries have been seen using HTTP POST requests to upload maliciously-crafted zip files to Confluence WebServers to exploit this vulnerability. After exploitation, adversaries were observed doing local system information discovery, downloading malicious payloads,
References
CVE-2023-22518 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2023-22518 is an improper authorization vulnerability. Adversaries have been seen using HTTP POST requests to upload maliciously-crafted zip files to Confluence WebServers to exploit this vulnerability. After exploitation, adversaries were observed doing local system information discovery and downloading malicious payloads.
References
CVE-2023-27350 PaperCut MF/NG Improper Access Control Vulnerability secondary_impact T1105 Ingress Tool Transfer
Comments
CVE-2023-27350 allows an unauthenticated actor to execute malicious code remotely without credentials. Threat actors have been observed exploiting this software through its print scripting interface and installed command and control software on target machines.
References
CVE-2023-27350 PaperCut MF/NG Improper Access Control Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2023-27350 allows an unauthenticated actor to execute malicious code remotely without credentials. Threat actors have been observed exploiting this software through its print scripting interface and installed command and control software on target machines.
References
CVE-2023-27350 PaperCut MF/NG Improper Access Control Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2023-27350 allows an unauthenticated actor to execute malicious code remotely without credentials. Threat actors have been observed exploiting this software through its print scripting interface and installed command and control software on target machines.
References
CVE-2021-44168 Fortinet FortiOS Arbitrary File Download primary_impact T1601 Modify System Image
Comments
CVE-2021-44168 is an unverified update download vulnerability that can be exploited by adversaries with local access creating specifically crafted download packages.
References
CVE-2021-44168 Fortinet FortiOS Arbitrary File Download exploitation_technique T1078.003 Local Accounts
Comments
CVE-2021-44168 is an unverified update download vulnerability that can be exploited by adversaries with local access creating specifically crafted download packages.
References
CVE-2021-22017 VMware vCenter Server Improper Access Control primary_impact T1090.001 Internal Proxy
Comments
The vulnerability in Rhttproxy within VMware's vCenter Server arises from an improper implementation of URI normalization. Attackers with network access to port 443 on the vCenter Server exploit this flaw by sending specially crafted requests, allowing them to bypass the proxy mechanism. This exploitation grants unauthorized access to internal endpoints, potentially exposing sensitive information.
References
CVE-2021-22017 VMware vCenter Server Improper Access Control exploitation_technique T1190 Exploit Public-Facing Application
Comments
The vulnerability in Rhttproxy within VMware's vCenter Server arises from an improper implementation of URI normalization. Attackers with network access to port 443 on the vCenter Server exploit this flaw by sending specially crafted requests, allowing them to bypass the proxy mechanism. This exploitation grants unauthorized access to internal endpoints, potentially exposing sensitive information.
References
CVE-2023-49103 ownCloud graphapi Information Disclosure Vulnerability primary_impact T1552 Unsecured Credentials
Comments
This vulnerability is exploited through an unauthenticated information disclosure flaw in the Graph API extension of ownCloud. Attackers first used this vulnerability to gain initial access by targeting the /apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php endpoint, which allowed them to leak sensitive information via the PHP function phpinfo. By modifying the requested URI to bypass Apache web server rewrite rules, attackers could access environment variables containing secrets, such as usernames, passwords, and license keys.
References
CVE-2023-49103 ownCloud graphapi Information Disclosure Vulnerability primary_impact T1005 Data from Local System
Comments
This vulnerability is exploited through an unauthenticated information disclosure flaw in the Graph API extension of ownCloud. Attackers first used this vulnerability to gain initial access by targeting the /apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php endpoint, which allowed them to leak sensitive information via the PHP function phpinfo. By modifying the requested URI to bypass Apache web server rewrite rules, attackers could access environment variables containing secrets, such as usernames, passwords, and license keys.
References
CVE-2023-49103 ownCloud graphapi Information Disclosure Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through an unauthenticated information disclosure flaw in the Graph API extension of ownCloud. Attackers first used this vulnerability to gain initial access by targeting the /apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php endpoint, which allowed them to leak sensitive information via the PHP function phpinfo. By modifying the requested URI to bypass Apache web server rewrite rules, attackers could access environment variables containing secrets, such as usernames, passwords, and license keys.
References
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability secondary_impact T1078 Valid Accounts
Comments
This vulnerability is exploited through improper input validation in Atlassian Confluence, allowing remote attackers to translate arbitrary HTTP parameters into getter/setter sequences via the XWorks2 middleware. This vulnerability enables the creation of unauthorized Confluence administrator accounts and the upload of malicious plugins, granting attackers the ability to modify Java objects at runtime and execute arbitrary code. A nation-state actor known as Storm-0062 has been attributed to exploiting this vulnerability in the wild.
References
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through improper input validation in Atlassian Confluence, allowing remote attackers to translate arbitrary HTTP parameters into getter/setter sequences via the XWorks2 middleware. This vulnerability enables the creation of unauthorized Confluence administrator accounts and the upload of malicious plugins, granting attackers the ability to modify Java objects at runtime and execute arbitrary code. A nation-state actor known as Storm-0062 has been attributed to exploiting this vulnerability in the wild.
References
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability primary_impact T1059.007 JavaScript
Comments
This vulnerability is exploited through improper input validation in Atlassian Confluence, allowing remote attackers to translate arbitrary HTTP parameters into getter/setter sequences via the XWorks2 middleware. This vulnerability enables the creation of unauthorized Confluence administrator accounts and the upload of malicious plugins, granting attackers the ability to modify Java objects at runtime and execute arbitrary code. A nation-state actor known as Storm-0062 has been attributed to exploiting this vulnerability in the wild.
References
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability primary_impact T1136 Create Account
Comments
This vulnerability is exploited through improper input validation in Atlassian Confluence, allowing remote attackers to translate arbitrary HTTP parameters into getter/setter sequences via the XWorks2 middleware. This vulnerability enables the creation of unauthorized Confluence administrator accounts and the upload of malicious plugins, granting attackers the ability to modify Java objects at runtime and execute arbitrary code. A nation-state actor known as Storm-0062 has been attributed to exploiting this vulnerability in the wild.
References
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through improper input validation in Atlassian Confluence, allowing remote attackers to translate arbitrary HTTP parameters into getter/setter sequences via the XWorks2 middleware. This vulnerability enables the creation of unauthorized Confluence administrator accounts and the upload of malicious plugins, granting attackers the ability to modify Java objects at runtime and execute arbitrary code. A nation-state actor known as Storm-0062 has been attributed to exploiting this vulnerability in the wild.
References
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability secondary_impact T1003.003 NTDS
Comments
CVE-2024-24919 is an information disclosure/arbitrary file read vulnerability within Check Point's Quantum Security Gateway products. It's been reported that attacker are leveraging this vulnerability to retrieve, all files on the local file system, read sensitive data and extract credentials for all local accounts, including Active Directory, SSH keys, and certificates.
References
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability secondary_impact T1003.008 /etc/passwd and /etc/shadow
Comments
CVE-2024-24919 is an information disclosure/arbitrary file read vulnerability within Check Point's Quantum Security Gateway products. It's been reported that attacker are leveraging this vulnerability to retrieve, all files on the local file system, read sensitive data and extract credentials for all local accounts, including Active Directory, SSH keys, and certificates.
References
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability secondary_impact T1059.004 Unix Shell
Comments
CVE-2024-24919 is an information disclosure/arbitrary file read vulnerability within Check Point's Quantum Security Gateway products. It's been reported that attacker are leveraging this vulnerability to retrieve, all files on the local file system, read sensitive data and extract credentials for all local accounts, including Active Directory, SSH keys, and certificates.
References
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability primary_impact T1005 Data from Local System
Comments
CVE-2024-24919 is an information disclosure/arbitrary file read vulnerability within Check Point's Quantum Security Gateway products. It's been reported that attacker are leveraging this vulnerability to retrieve, all files on the local file system, read sensitive data and extract credentials for all local accounts, including Active Directory, SSH keys, and certificates.
References
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability exploitation_technique T1202 Indirect Command Execution
Comments
CVE-2024-24919 is an information disclosure/arbitrary file read vulnerability within Check Point's Quantum Security Gateway products. It's been reported that attacker are leveraging this vulnerability to retrieve, all files on the local file system, read sensitive data and extract credentials for all local accounts, including Active Directory, SSH keys, and certificates.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2021-44168 Fortinet FortiOS Arbitrary File Download 2
CVE-2024-24919 Check Point Quantum Security Gateways Information Disclosure Vulnerability 5
CVE-2023-29298 Adobe ColdFusion Improper Access Control Vulnerability 1
CVE-2023-38205 Adobe ColdFusion Improper Access Control Vulnerability 1
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability 4
CVE-2021-22017 VMware vCenter Server Improper Access Control 2
CVE-2023-22518 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability 3
CVE-2019-11510 Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability 4
CVE-2023-27350 PaperCut MF/NG Improper Access Control Vulnerability 3
CVE-2009-3960 Adobe BlazeDS Information Disclosure Vulnerability 2
CVE-2021-40655 D-Link DIR-605 Router Information Disclosure Vulnerability 1
CVE-2013-0631 Adobe ColdFusion Information Disclosure Vulnerability 2
CVE-2023-22515 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability 5
CVE-2020-8196 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability 3
CVE-2021-26085 Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability 2
CVE-2023-49103 ownCloud graphapi Information Disclosure Vulnerability 3
CVE-2020-8195 Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability 3