Description
The product stores sensitive information in a file system or device that does not have built-in access control.
While many modern file systems or devices utilize some form of access control in order to restrict access to data, not all storage mechanisms have this capability. For example, memory cards, floppy disks, CDs, and USB devices are typically made accessible to any user within the system. This can become a problem when sensitive data is stored in these mechanisms in a multi-user environment, because anybody on the system can read or write this data. On Android devices, external storage is typically globally readable and writable by other applications on the device. External storage may also be easily accessible through the mobile device's USB connection or physically accessible through the device's memory card port.
Potential Impact
Confidentiality
Read Application Data, Read Files or Directories
Integrity
Modify Application Data, Modify Files or Directories
Related Weaknesses
Frequently Asked Questions
What is CWE-921?
CWE-921 (Storage of Sensitive Data in a Mechanism without Access Control) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product stores sensitive information in a file system or device that does not have built-in access control.
How can CWE-921 be exploited?
Attackers can exploit CWE-921 (Storage of Sensitive Data in a Mechanism without Access Control) to read application data, read files or directories. This weakness is typically introduced during the Architecture and Design phase of software development.
How do I prevent CWE-921?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-921?
CWE-921 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.