CWE · MITRE source
CWE-359Exposure of Private Personal Information to an Unauthorized Actor
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (33)AI
Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
PM-18 | Privacy Program Plan | PM | The privacy program plan explicitly addresses protection of personal information, mandating controls and resources that prevent unauthorized exposure of private personal data across the enterprise. |
PM-19 | Privacy Program Leadership Role | PM | Dedicated accountability and resources for managing privacy risks directly reduce exposure of private personal information. |
PM-20 | Dissemination of Privacy Program Information | PM | Public dissemination of privacy practices, reports, and feedback channels increases organizational accountability and enables external scrutiny, reducing the likelihood that exposures of private personal information remain undetected or unremediated. |
PT-1 | Policy and Procedures | PT | PII transparency and processing policy plus procedures reduce the chance of unauthorized exposure of private personal information. |
PT-2 | Authority to Process Personally Identifiable Information | PT | Enforces restriction of PII processing to authorized purposes, reducing exposure of private personal information to unauthorized actors. |
PT-3 | Personally Identifiable Information Processing Purposes | PT | Restricts PII processing and disclosure to authorized purposes, reducing unauthorized exposure of private personal information. |
AC-15 | Automated Marking | AC | Automated marking identifies private personal information in outputs, tangibly reducing the ability to exploit weaknesses that result in its unauthorized exposure. |
AC-16 | Security and Privacy Attributes | AC | Privacy-specific attributes and their controlled association directly reduce exposure of private personal information through missing or incorrect labeling. |
AC-22 | Publicly Accessible Content | AC | Preventing nonpublic personal information from public posting reduces unauthorized exposure of private personal data. |
RA-2 | Security Categorization | RA | Explicit categorization of PII ensures stronger privacy controls are applied and approved before system operation. |
RA-3 | Risk Assessment | RA | The control specifically requires assessing adverse effects from PII processing, directly mitigating privacy-related information exposure. |
RA-8 | Privacy Impact Assessments | RA | PIAs explicitly identify and drive mitigation of risks involving unauthorized exposure or misuse of private personal information before systems or collections are implemented. |
SI-18 | Personally Identifiable Information Quality Operations | SI | Targeted operations on PII accuracy, timeliness, and deletion reduce the risk of private personal information remaining available for unauthorized exposure. |
SI-19 | De-identification | SI | Explicitly targets removal of private personal information (PII) to stop its exposure to unauthorized parties. |
SI-20 | Tainting | SI | Tainting enables identification of exfiltration of private personal information to unauthorized parties. |
Show 18 more broadly-applicable controls
PM-21 | Accounting of Disclosures | PM | The control mandates an auditable trail specifically for private personal information, making unauthorized disclosures of PII more readily discoverable by the affected individual. |
PM-22 | Personally Identifiable Information Quality Management | PM | Organization-wide accuracy, relevance, and deletion rules limit the private personal information available for unauthorized exposure. |
PM-24 | Data Integrity Board | PM | The board evaluates privacy implications of proposed matching, directly mitigating exposure of private personal information through uncontrolled data sharing. |
PM-25 | Minimization of Personally Identifiable Information Used in Testing, Training, and Research | PM | Explicitly limits use of private personal information (PII) for non-operational purposes, reducing opportunities for its exposure outside production systems. |
PM-26 | Complaint Management | PM | Gives data subjects a reliable mechanism to report exposure of private personal information, driving corrective action that mitigates privacy-related information-leakage weaknesses. |
PM-27 | Privacy Reporting | PM | Directly monitors compliance with mandates protecting personal information, making undetected exposure to unauthorized actors harder to sustain. |
PT-4 | Consent | PT | Mandating consent prior to collection directly prevents unauthorized exposure of private personal information. |
PT-5 | Privacy Notice | PT | Clear, plain-language notice of PII processing authority, purposes, and scope creates transparency that makes unauthorized exposure of private personal information more likely to be detected and challenged by individuals. |
PT-6 | System of Records Notice | PT | Requiring accurate, policy-scoped SORNs for Privacy Act records forces explicit identification and public documentation of PII handling, directly reducing the likelihood that personal data will be exposed without appropriate safeguards or accountability. |
PT-7 | Specific Categories of Personally Identifiable Information | PT | The control mandates tailored handling for designated categories of personally identifiable information, thereby limiting unauthorized disclosure of private personal data. |
PT-8 | Computer Matching Requirements | PT | Limits exposure of private personal information by restricting matching to approved programs, publishing notices, and allowing individuals to contest findings. |
AC-23 | Data Mining Protection | AC | The control detects and protects against mining of private personal information, reducing unauthorized exposure of PII. |
PL-5 | Privacy Impact Assessment | PL | PIA explicitly identifies PII collection/use/disclosure flows and drives mitigations that reduce the likelihood of unauthorized exposure of private personal information. |
PL-8 | Security and Privacy Architectures | PL | The control specifically requires architectures that minimize privacy risk when processing PII, directly addressing exposure of personal information. |
SC-15 | Collaborative Computing Devices and Applications | SC | Blocks unauthorized remote access that would expose private personal information via collaborative devices. |
SC-42 | Sensor Capability and Data | SC | Mandatory user notification of sensor activation makes surreptitious capture of private personal information (camera, microphone, location, etc.) substantially harder to perform without detection. |
AT-2 | Literacy Training and Awareness | AT | Privacy literacy training directly targets preventing exposure of personal information through user mishandling. |
CM-12 | Information Location | CM | Tracking locations of sensitive data and access users reduces risk of private personal information exposure. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2022-0482 | 7.3 | 9.1 | 0.9079 | 2022-03-09 |
CVE-2024-45591 | 6.2 | 5.3 | 0.8619 | 2024-09-10 |
CVE-2023-50719 | 4.6 | 7.5 | 0.5112 | 2023-12-15 |
CVE-2024-11396 | 4.3 | 5.3 | 0.5417 | 2025-01-14 |
CVE-2025-34441 | 4.3 | 7.5 | 0.4749 | 2025-12-17 |
CVE-2024-30056 | 2.0 | 7.1 | 0.0972 | 2024-05-25 |
CVE-2022-2921 | 1.8 | 8.8 | 0.0046 | 2022-08-21 |
CVE-2025-49715 | 1.8 | 7.5 | 0.0573 | 2025-06-20 |
CVE-2023-36018 | 1.7 | 7.8 | 0.0161 | 2023-11-14 |
CVE-2023-36052 | 1.7 | 8.6 | 0.0040 | 2023-11-14 |
CVE-2024-26192 | 1.7 | 8.2 | 0.0021 | 2024-02-23 |
CVE-2023-50053 | 1.6 | 7.6 | 0.0065 | 2024-04-30 |
CVE-2024-42347 | 1.6 | 7.7 | 0.0077 | 2024-08-06 |
CVE-2025-11959 | 1.6 | 8.1 | 0.0004 | 2025-11-11 |
CVE-2021-21823 | 1.5 | 7.5 | 0.0027 | 2021-08-20 |
CVE-2021-3980 | 1.5 | 7.5 | 0.0064 | 2021-12-03 |
CVE-2022-36091 | 1.5 | 7.5 | 0.0045 | 2022-09-08 |
CVE-2023-2703 | 1.5 | 7.5 | 0.0009 | 2023-05-23 |
CVE-2023-35151 | 1.5 | 7.5 | 0.0042 | 2023-06-23 |
CVE-2023-44156 | 1.5 | 7.5 | 0.0024 | 2023-09-27 |
CVE-2023-5983 | 1.5 | 7.5 | 0.0019 | 2023-11-22 |
CVE-2024-28387 | 1.5 | 7.5 | 0.0006 | 2024-03-25 |
CVE-2024-33271 | 1.5 | 7.5 | 0.0023 | 2024-04-29 |
CVE-2024-36677 | 1.5 | 7.5 | 0.0042 | 2024-06-19 |
CVE-2024-36682 | 1.5 | 7.5 | 0.0028 | 2024-06-24 |