CWE-276: Incorrect Default Permissions
low-riskDuring installation, installed file permissions are set to allow anyone to modify those files.
Common Consequences
Detection Methods
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Inter-application Flow Analysis
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Host-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria Web Application Scanner Web Services Scanner Database Scanners
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Host Application Interface Scanner Cost effective for partial coverage: Fuzz Tester Framework-based Fuzzer Automated Monitored Execution Forced Path Execution
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Context-configured Source Code Weakness Analyzer
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Configuration Checker
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2017-11610 | 8.8 | 93.8% | — |
| CVE-2013-0632 | 9.8 | 92.7% | Y |
| CVE-2013-0632 | 9.8 | 92.7% | Y |
| CVE-2023-29919 | 9.1 | 91.9% | — |
| CVE-2023-29919 | 9.1 | 91.9% | — |
| CVE-2023-29923 | 5.3 | 83.4% | — |
| CVE-2023-29923 | 5.3 | 83.4% | — |
| CVE-2017-8625 | 8.8 | 69.8% | — |
| CVE-2020-9039 | 9.8 | 66.1% | — |
| CVE-2020-7943 | 7.5 | 65.4% | — |