Cyber Posture

CWE · MITRE source

CWE-497Exposure of Sensitive System Information to an Unauthorized Control Sphere

Abstraction: Base · CVEs in our corpus: 314

The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.

Network-based products, such as web applications, often run on top of an operating system or similar environment. When the product communicates with outside parties, details about the underlying system are expected to remain hidden, such as path names for data files, other OS users, installed packages, the application environment, etc. This system information may be provided by the product itself, or buried within diagnostic or debugging messages. Debugging information helps an adversary learn about the system and form an attack plan. An information exposure occurs when system data or debugging information leaves the program through an output stream or logging function that makes it accessible to unauthorized parties. Using other weaknesses, an attacker could cause errors to occur; the response to these errors can reveal detailed system information, along with other impacts. An attacker can use messages that reveal technologies, operating systems, and product versions to tune the attack against known vulnerabilities in these technologies. A product may use diagnostic methods that provide significant implementation details such as stack traces as part of its error handling mechanism.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (10)AI

Control Title Family Why it addresses this CWE
AC-22Publicly Accessible ContentACOngoing reviews detect and remove sensitive system information before it reaches publicly accessible systems.
AC-23Data Mining ProtectionACEmploys detection to prevent unauthorized mining of sensitive system information from being exfiltrated to external control spheres.
SI-11Error HandlingSIEnsures sensitive system information is not disclosed outside the intended control sphere through error output.
SI-20TaintingSIThe control detects removal of sensitive system information into an unauthorized control sphere.
CM-12Information LocationCMDocumenting where system information is processed and stored prevents exposure to unauthorized control spheres.
PE-19Information LeakagePEThe control stops sensitive system information from crossing into unauthorized control spheres through EM emanations.
PM-25Minimization of Personally Identifiable Information Used in Testing, Training, and ResearchPMAuthorization and minimization requirements keep PII out of test/research control spheres that often lack production-grade protections.
RA-2Security CategorizationRADocumented categorization of system information reduces the chance that sensitive internals are left exposed to unauthorized spheres.
SC-30Concealment and MisdirectionSCSystem information is concealed or replaced with decoys, reducing leakage to unauthorized observers.
SR-7Supply Chain Operations SecuritySRProtecting supply-chain artifacts reduces exposure of sensitive system information outside its intended control sphere.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2025-344424.37.50.47492025-12-17
CVE-2021-31955 KEV3.35.50.04072021-06-08
CVE-2024-57353.37.50.30212024-06-28
CVE-2020-251792.09.80.00222020-12-14
CVE-2023-03422.03.10.23032023-06-09
CVE-2024-365542.09.80.00132025-02-06
CVE-2025-11442.09.80.00352025-02-11
CVE-2025-58932.09.80.00592025-06-09
CVE-2025-65612.09.80.00592025-06-26
CVE-2025-102642.010.00.00072025-09-12
CVE-2025-448232.09.90.00832025-10-07
CVE-2025-476992.09.90.00062025-10-23
CVE-2024-139992.09.80.00842025-10-30
CVE-2026-274942.09.90.00092026-02-25
CVE-2023-325501.99.30.00222023-06-06
CVE-2024-40081.99.60.00242024-06-05
CVE-2024-139951.98.80.01672025-10-30
CVE-2022-19021.88.80.00822022-09-01
CVE-2024-396751.88.80.00092024-07-09
CVE-2025-93641.88.80.00022025-09-09
CVE-2025-127791.88.80.00022025-11-05
CVE-2022-286511.78.40.00002022-04-05
CVE-2025-00611.78.70.00152025-01-14
CVE-2024-123671.78.60.00062025-09-16
CVE-2026-344131.78.60.00412026-04-22