Description
The product collects personally identifiable information about a human user or the user's activities, but the product accesses this information using other resources besides itself, and it does not require that user's explicit approval or direct input into the product.
"Spyware" is a commonly used term with many definitions and interpretations. In general, it is meant to refer to products that collect information or install functionality that human users might not allow if they were fully aware of the actions being taken by the software. For example, a user might expect that tax software would collect a social security number and include it when filing a tax return, but that same user would not expect gaming software to obtain the social security number from that tax software's data.
Potential Impact
Confidentiality
Read Application Data
Mitigations & Prevention
Use spyware detection and removal software.
Always verify the integrity of the product that is being installed.
Related Weaknesses
Frequently Asked Questions
What is CWE-512?
CWE-512 (Spyware) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product collects personally identifiable information about a human user or the user's activities, but the product accesses this information using other resources besides itself, and it does not re...
How can CWE-512 be exploited?
Attackers can exploit CWE-512 (Spyware) to read application data. This weakness is typically introduced during the Architecture and Design, Implementation, Operation phase of software development.
How do I prevent CWE-512?
Key mitigations include: Use spyware detection and removal software.
What is the severity of CWE-512?
CWE-512 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.