NIST 800-53 r5 · Controls catalogue · Family CM
CM-10Software Usage Restrictions
Use software and associated documentation in accordance with contract agreements and copyright laws; Track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
Last updated: 09 May 2026 03:25 UTC
Implementations targeting this control (0)
- No implementations targeting this control yet.
ATT&CK techniques this control mitigates (9)
- T1546.008 Accessibility Features Privilege Escalation, Persistence
- T1546.013 PowerShell Profile Privilege Escalation, Persistence
- T1550.001 Application Access Token Lateral Movement
- T1553 Subvert Trust Controls Defense Impairment
- T1553.004 Install Root Certificate Defense Impairment
- T1559 Inter-Process Communication Execution
- T1559.002 Dynamic Data Exchange Execution
- T1685 Disable or Modify Tools Defense Impairment
- T1688 Safe Mode Boot Defense Impairment
Weaknesses this control addresses (3)AI
CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.
| CWE | Name | CVEs | Why this control addresses it |
|---|---|---|---|
CWE-552 | Files or Directories Accessible to External Parties | 540 | Controlling and documenting P2P file sharing prevents files and directories from being made accessible to external parties for unauthorized distribution. |
CWE-829 | Inclusion of Functionality from Untrusted Control Sphere | 254 | Limiting P2P file sharing technology reduces inclusion of functionality or resources from untrusted external control spheres. |
CWE-506 | Embedded Malicious Code | 80 | Restricting software to licensed versions and controlling P2P prevents introduction of software containing embedded malicious code from unauthorized sources. |
Top CVEs where this control is the strongest mitigation
| CVE | Risk | CVSS | EPSS | Match |
|---|---|---|---|---|
CVE-2026-41380 | 1.5 | 7.3 | 0.0002 | good |
CVE-2026-42778 | 2.0 | 9.8 | 0.0019 | good |
CVE-2026-32973 | 2.0 | 9.8 | 0.0008 | good |
CVE-2026-28363 | 2.0 | 9.9 | 0.0005 | good |
CVE-2020-37181 | 2.0 | 9.8 | 0.0008 | good |
CVE-2022-50935 | 2.0 | 9.8 | 0.0006 | good |
CVE-2019-25268 | 2.0 | 9.8 | 0.0007 | good |
CVE-2025-49457 | 1.9 | 9.6 | 0.0018 | good |
CVE-2025-27105 | 1.8 | 9.1 | 0.0033 | good |
CVE-2026-35666 | 1.8 | 8.8 | 0.0005 | good |
CVE-2026-30478 | 1.8 | 8.8 | 0.0001 | good |
CVE-2026-29610 | 1.8 | 8.8 | 0.0009 | good |
CVE-2026-32920 | 1.7 | 8.4 | 0.0002 | good |
CVE-2026-32172 | 1.6 | 8.0 | 0.0005 | good |
CVE-2026-42171 | 1.6 | 7.8 | 0.0001 | good |
CVE-2024-9157 | 1.6 | 7.8 | 0.0003 | good |
CVE-2021-47653 | 1.6 | 7.8 | 0.0002 | good |
CVE-2026-32015 | 1.6 | 7.8 | 0.0001 | good |
CVE-2024-53588 | 1.6 | 7.8 | 0.0004 | good |
CVE-2026-32016 | 1.6 | 7.8 | 0.0001 | good |
CVE-2026-32948 | 1.6 | 7.8 | 0.0001 | good |
CVE-2026-25880 | 1.6 | 7.8 | 0.0002 | good |
CVE-2026-25866 | 1.6 | 7.8 | 0.0002 | good |
CVE-2026-6594 | 1.5 | 7.3 | 0.0006 | good |
CVE-2025-26125 | 1.5 | 7.3 | 0.0010 | good |