CWE一覧に戻る
CWE-1266

廃棄デバイスからの機密データの不適切な消去

Improper Scrubbing of Sensitive Data from Decommissioned Device
脆弱性 作成中
JA

製品が廃止される際に、製品管理者が機密データを削除する機能が適切に提供されていない。 スクラビング機能がない、不十分、または不正確である可能性がある。

ベストプラクティスや規制上の要件により、製品を廃止する場合、管理者は機密データを最初に削除または上書きする必要があります。 退役したデバイスから機密データを不適切にスクラビングすると、そのデータは悪意のある行為者に取得されやすくなります。機密データには、デバイス/メーカーの専有情報、ユーザー/デバイスの認証情報、ネットワーク設定、その他の形式の機密データが含まれますが、これらに限定されません。

EN

The product does not properly provide a capability for the product administrator to remove sensitive data at the time the product is decommissioned. A scrubbing capability could be missing, insufficient, or incorrect.

When a product is decommissioned - i.e., taken out of service - best practices or regulatory requirements may require the administrator to remove or overwrite sensitive data first, i.e. "scrubbing." Improper scrubbing of sensitive data from a decommissioned device leaves that data vulnerable to acquisition by a malicious actor. Sensitive data may include, but is not limited to, device/manufacturer proprietary information, user/device credentials, network configurations, and other forms of sensitive data.

Scope: Confidentiality / Impact: Read Memory
Functionality to completely scrub data from a product at the conclusion of its lifecycle should be part of the design phase. Trying to add this function on top of an existing architecture could lead to incomplete removal of sensitive information/data.
The manufacturer should describe the location(s) where sensitive data is stored and the policies and procedures for its removal. This information may be conveyed, for example, in an Administrators Guide or a Statement of Volatility.
If the capability to wipe sensitive data isn't built-in, the manufacturer may need to provide a utility to scrub sensitive data from storage if that data is located in a place which is non-accessible by the administrator. One example of this could be when sensitive data is stored on an EEPROM for which there is no user/admin interface provided by the system.
MITRE公式ページ — CWE-1266