Cyber Posture

CWE · MITRE source

CWE-200Exposure of Sensitive Information to an Unauthorized Actor

Abstraction: Class · CVEs in our corpus: 9,890

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: Information might be sensitive to different parties, each of which may have their own expectations for whether the information should be protected. These parties include: Information exposures can occur in different ways: It is common practice to describe any loss of confidentiality as an "information exposure," but this can lead to overuse of CWE-200 in CWE mapping. From the CWE perspective, loss of confidentiality is a technical impact that can arise from dozens of different weaknesses, such as insecure file permissions or out-of-bounds read. CWE-200 and its lower-level descendants are intended to cover the mistakes that occur in behaviors that explicitly manage, store, transfer, or cleanse sensitive information.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (80)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
PM-1Information Security Program PlanPMRequiring protection of the program plan from unauthorized disclosure directly reduces exposure of sensitive security program details and control descriptions.
PM-11Mission and Business Process DefinitionPMExplicitly requires identifying protection needs for sensitive information during process definition, making exposure to unauthorized actors less likely through better process design.
PM-13Security and Privacy WorkforcePMTrained staff understand data-handling requirements and are less likely to expose sensitive information through misconfiguration or poor design.
SC-14Public Access ProtectionsSCLimits disclosure of sensitive information by ensuring only authorized actors can reach it through public interfaces.
SC-15Collaborative Computing Devices and ApplicationsSCPrevents covert remote capture and exposure of audio/video streams to unauthorized actors.
SC-16Transmission of Security and Privacy AttributesSCAssociating security/privacy attributes with exchanged data enables receiving systems to enforce handling rules and avoid unauthorized disclosure.
SI-11Error HandlingSIRestricts error message visibility to authorized recipients, directly reducing unauthorized exposure of sensitive information.
SI-15Information Output FilteringSIFiltering output to only permitted content stops unintended disclosure of sensitive information to unauthorized actors.
SI-18Personally Identifiable Information Quality OperationsSIRegular deletion of inaccurate or outdated PII directly reduces the volume of sensitive information retained that could be exposed.
AC-15Automated MarkingACAutomated marking applies security attributes to system outputs, making it harder for attackers to exploit unmarked sensitive information leading to unauthorized exposure.
AC-16Security and Privacy AttributesACProper attribute retention and permitted-value enforcement limits unauthorized actors from accessing sensitive information lacking correct labels.
AC-20Use of External SystemsACPrevents unauthorized exposure of sensitive information by prohibiting untrusted external systems from processing or storing it.
MP-1Policy and ProceduresMPThe media protection policy defines requirements and procedures to prevent unauthorized disclosure or access to sensitive information on media.
MP-3Media MarkingMPMedia marking ensures sensitive information on removable or system media is handled according to its classification, reducing the chance of inadvertent exposure to unauthorized actors.
MP-4Media StorageMPSecure storage and protection of media until destruction or sanitization prevents unauthorized actors from accessing sensitive information on the media.
Show 65 more broadly-applicable controls
PM-17Protecting Controlled Unclassified Information on External SystemsPMPolicies mandate protection of CUI on external systems, directly reducing unauthorized exposure of sensitive information.
PM-21Accounting of DisclosuresPMRequiring detailed, requestable records of every PII disclosure directly aids detection of unauthorized exposures of sensitive information.
PM-22Personally Identifiable Information Quality ManagementPMPolicies requiring periodic review and deletion of inaccurate/outdated PII reduce the amount of sensitive information retained and therefore exposed.
PM-23Data Governance BodyPMPromotes data classification, handling, and protection policies that limit unauthorized exposure of sensitive information.
PM-24Data Integrity BoardPMAnnual reviews and proposal scrutiny detect and block matching programs that would expose sensitive data to unauthorized recipients or systems.
PM-25Minimization of Personally Identifiable Information Used in Testing, Training, and ResearchPMMinimizing PII in testing/training/research directly reduces the volume of sensitive data present in environments where it could be exposed to unauthorized actors.
PM-26Complaint ManagementPMProvides individuals an accessible, tracked channel to report exposures of sensitive information, prompting timely organizational review and remediation that shortens the window for exploitation.
PM-27Privacy ReportingPMPrivacy reports require tracking and disclosing unauthorized exposures of sensitive information, increasing detection risk for such weaknesses.
PM-5System InventoryPMInventory identifies all systems holding or processing data, enabling detection of unauthorized exposure paths before exploitation.
PM-8Critical Infrastructure PlanPMPrivacy provisions in the plan reduce the chance that sensitive data held by critical infrastructure is left exposed to unauthorized actors.
SC-22Architecture and Provisioning for Name/Address Resolution ServiceSCInternal/external role separation directly prevents external actors from obtaining sensitive internal host and network information via name resolution.
SC-25Thin NodesSCMinimal information storage directly reduces the quantity of sensitive data resident on the component that could be exposed.
SC-26DecoysSCDecoys supply misleading data and log access attempts, directly detecting and deflecting unauthorized information exposure.
SC-28Protection of Information at RestSCEncrypting or otherwise protecting data at rest directly prevents unauthorized actors from reading sensitive information stored on disk or other media.
SC-30Concealment and MisdirectionSCConcealment techniques directly prevent real sensitive data from being exposed to adversaries.
SC-37Out-of-band ChannelsSCOut-of-band delivery transmits sensitive data on a separate path, directly reducing exposure to unauthorized actors on the primary channel.
SC-38Operations SecuritySCDirectly prevents exposure of critical organizational information by applying OPSEC processes across the SDLC.
SC-40Wireless Link ProtectionSCWireless link protection (encryption, directional transmission, etc.) directly prevents unauthorized actors from observing transmitted data.
SC-42Sensor Capability and DataSCRequiring explicit sensor-use indication and prohibiting selected capabilities directly reduces covert collection and exposure of sensitive data captured by device sensors.
SI-19De-identificationSIDe-identification directly prevents exposure of sensitive/PII data to unauthorized actors when datasets are released or shared.
SI-20TaintingSITainting directly detects exfiltration resulting from exposure of sensitive information to unauthorized actors.
SI-21Information RefreshSIDeleting information when no longer needed directly reduces the window during which sensitive data can be exposed to unauthorized actors.
SI-23Information FragmentationSIFragmentation across systems ensures that exposure from any single component yields only incomplete information, directly reducing the impact of unauthorized disclosure.
AC-21Information SharingACBy enforcing authorization matching prior to sharing, the control reduces the risk of exposing sensitive information to unauthorized actors.
AC-22Publicly Accessible ContentACReview and removal of nonpublic information from publicly accessible systems directly prevents exposure of sensitive data to unauthorized actors.
AC-23Data Mining ProtectionACData mining protection mechanisms detect and block unauthorized bulk extraction of sensitive data, directly mitigating exposure to unauthorized actors.
MP-5Media TransportMPProtecting and controlling media during external transport prevents exposure of sensitive information to unauthorized actors.
MP-6Media SanitizationMPSanitizing media before disposal or release out of control prevents sensitive information from remaining accessible to unauthorized actors who obtain the media.
MP-8Media DowngradingMPProper media downgrading process prevents sensitive information from remaining on media that is then accessible to lower-classification recipients.
AU-13Monitoring for Information DisclosureAUMonitoring directly detects unauthorized disclosure of sensitive information, enabling response to exposures.
AU-14Session AuditAUSession auditing enables detection of unauthorized exposure or access to sensitive information during user activities.
AU-16Cross-organizational Audit LoggingAUCoordinating audit logging across organizational boundaries reduces the risk of sensitive audit data being exposed to unauthorized actors during transmission.
AU-6Audit Record Review, Analysis, and ReportingAUAudit record review and analysis can detect unauthorized exposure or access to sensitive information.
AU-9Protection of Audit InformationAUProtecting audit information prevents exposure of sensitive data contained within logs to unauthorized actors.
RA-10Threat HuntingRAHunting tracks data exfiltration or unauthorized disclosure of sensitive information as a key threat indicator.
RA-2Security CategorizationRACategorization identifies sensitive data so that confidentiality protections commensurate with impact level are selected and documented.
RA-3Risk AssessmentRAExplicit evaluation of disclosure risks from sensitive data processing drives controls that reduce exposure to unauthorized actors.
RA-6Technical Surveillance Countermeasures SurveyRATSCM surveys directly detect and remove covert collection devices that would otherwise expose sensitive information to unauthorized actors.
RA-8Privacy Impact AssessmentsRAThe assessment process surfaces design decisions that could expose sensitive (including PII) data to unauthorized actors, prompting controls that reduce such exposure.
PT-1Policy and ProceduresPTExplicit policy scope and review cycles make improper disclosure of sensitive PII less likely to occur or persist.
PT-2Authority to Process Personally Identifiable InformationPTLimits PII handling to authorized authority, making unauthorized exposure of sensitive information less likely.
PT-7Specific Categories of Personally Identifiable InformationPTRequiring organization-defined processing conditions on specific PII categories directly reduces the chance that personal data will be exposed to unauthorized actors.
PT-8Computer Matching RequirementsPTReduces unauthorized exposure of sensitive information by requiring formal controls, public notice, and due-process steps around all matching activities.
CM-12Information LocationCMDocumenting information locations and authorized users enables better protection against unauthorized exposure of sensitive data.
CM-13Data Action MappingCMA data action map identifies locations where sensitive information may be exposed to unauthorized actors during processing or transfer.
CM-9Configuration Management PlanCMProtects the configuration management plan from unauthorized disclosure, reducing exposure of sensitive system details.
CP-2Contingency PlanCPMandates protection of the contingency plan against unauthorized disclosure, reducing exposure of sensitive recovery and operational information.
CP-6Alternate Storage SiteCPRequiring equivalent controls at the alternate storage site prevents unauthorized exposure of sensitive backup data.
CP-9System BackupCPProtecting confidentiality of backup information prevents unauthorized exposure of sensitive data stored in backups.
IR-10Integrated Information Security Analysis TeamIRThe integrated analysis team enables faster detection and containment of incidents involving unauthorized exposure of sensitive information, limiting attacker success in exploiting such weaknesses.
IR-8Incident Response PlanIRProtecting the incident response plan from unauthorized disclosure prevents exposure of sensitive organizational details and response procedures to unauthorized actors.
IR-9Information Spillage ResponseIRThe control's identification, isolation, alerting, and eradication steps directly limit the impact and exploitation window of unauthorized sensitive information exposure.
PE-17Alternate Work SitePEAssessing control effectiveness and providing incident communication channels at alternate sites reduces the likelihood of sensitive information exposure to unauthorized actors.
PE-19Information LeakagePEShielding or other emanation protections directly prevent sensitive information from reaching unauthorized actors via electromagnetic signals.
PE-5Access Control for Output DevicesPEReduces the ability of an unauthorized actor to obtain sensitive information that has been rendered to a physical output device.
AT-2Literacy Training and AwarenessATLiteracy training teaches users to recognize and avoid actions that result in unauthorized exposure of sensitive information.
AT-4Training RecordsATRetaining and monitoring training records confirms personnel have completed privacy and security awareness training on handling sensitive data, reducing the chance of unauthorized exposure due to lack of knowledge.
PL-2System Security and Privacy PlansPLRequires explicit protection of plans from unauthorized disclosure, directly reducing exposure of sensitive system and privacy information contained in them.
PL-8Security and Privacy ArchitecturesPLPrivacy and security architectures require controls to protect sensitive information from unauthorized exposure across the system lifecycle.
SR-12Component DisposalSRSecure disposal techniques directly prevent sensitive data from becoming accessible to unauthorized actors after components leave organizational control.
SR-7Supply Chain Operations SecuritySROPSEC controls directly protect supply chain information from unauthorized observation or disclosure.
CA-8Penetration TestingCAPenetration testing attempts to access or extract sensitive data, revealing exposure of sensitive information to unauthorized actors.
IA-6Authentication FeedbackIAObscuring authentication feedback prevents exposure of sensitive information such as valid usernames or failure reasons to unauthorized actors.
MA-2Controlled MaintenanceMASanitizing equipment to remove specified information before off-site maintenance prevents exposure of sensitive information to unauthorized actors such as external maintenance personnel.
SA-6Software Usage RestrictionsSAP2P usage restrictions directly reduce unauthorized external exposure of sensitive or copyrighted information.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2021-41277 KEV9.710.00.94352021-11-17
CVE-2023-49103 KEV9.710.00.94332023-11-21
CVE-2024-24919 KEV9.48.60.94342024-05-28
CVE-2016-6415 KEV9.17.50.93142016-09-19
CVE-2023-28432 KEV9.17.50.94002023-03-22
CVE-2025-31125 KEV8.05.30.82102025-03-31
CVE-2008-0655 KEV7.88.80.67292008-02-07
CVE-2020-3259 KEV7.77.50.69732020-05-06
CVE-2021-278507.69.80.94222021-04-15
CVE-2018-01277.59.80.91542018-02-08
CVE-2018-126347.59.80.92452018-06-22
CVE-2018-72517.49.80.90602018-02-19
CVE-2018-10006007.48.80.93512018-06-26
CVE-2017-111657.39.80.89822017-07-12
CVE-2016-2388 KEV7.15.30.67752016-02-16
CVE-2018-37607.17.50.93892018-06-26
CVE-2024-453887.17.50.93632024-09-02
CVE-2024-469387.17.50.93432024-09-15
CVE-2025-117497.19.80.85392025-11-05
CVE-2015-20807.07.50.92412016-10-07
CVE-2017-126167.07.50.91392017-09-19
CVE-2018-80337.07.50.92192018-12-13
CVE-2021-328197.08.00.89622021-05-14
CVE-2024-36567.08.10.89662024-10-09
CVE-2016-101756.99.80.81612017-01-30