Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-528 (将CoreDump文件暴露给非授权控制范围) — Vulnerability Class 2

2 vulnerabilities classified as CWE-528 (将CoreDump文件暴露给非授权控制范围). AI Chinese analysis included.

CWE-528 represents a critical information exposure weakness where software inadvertently generates core dump files containing sensitive data, such as memory contents and stack traces, and stores them in locations accessible to unauthorized actors. Attackers typically exploit this vulnerability by locating these dump files, often in default or poorly secured directories, to extract credentials, session tokens, or proprietary algorithmic logic embedded within the process memory. This exposure can lead to severe confidentiality breaches, enabling further attacks like privilege escalation or reverse engineering. To mitigate this risk, developers must configure systems to restrict core dump generation, ensuring they are stored only in highly secured, access-controlled directories. Additionally, implementing automatic deletion policies and auditing file permissions are essential practices to prevent unauthorized access to these potentially sensitive artifacts.

MITRE CWE Description
The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Common Consequences (1)
ConfidentialityRead Application Data, Read Files or Directories
Mitigations (1)
System ConfigurationProtect the core dump files from unauthorized access.
CVE IDTitleCVSSSeverityPublished
CVE-2025-48928 TeleMessage 安全漏洞 — service 4.0 Medium2025-05-28
CVE-2024-10403 SFTP/FTP password could be captured in plain text in Supportsave generated from SANnav — Fabric OS 6.5AIMediumAI2024-11-21

Vulnerabilities classified as CWE-528 (将CoreDump文件暴露给非授权控制范围) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.