Cyber Posture

CWE · MITRE source

CWE-668Exposure of Resource to Wrong Sphere

Abstraction: Class · CVEs in our corpus: 702

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing these private files. If the file permissions are insecure, then parties other than the user will be able to access those files. A separate control sphere might effectively require that the user can only access the private files, but not any other files on the system. If the program does not ensure that the user is only requesting private files, then the user might be able to access other files on the system. In either case, the end result is that a resource has been exposed to the wrong party.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (27)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SC-14Public Access ProtectionsSCEnforces separation so resources are not placed in a public sphere without explicit protection.
SC-2Separation of System and User FunctionalitySCPrevents exposure of system management resources and functions into the user functionality sphere.
SC-22Architecture and Provisioning for Name/Address Resolution ServiceSCFault-tolerant architecture with role separation keeps internal resolution resources from being exposed to external spheres.
AC-20Use of External SystemsACControls whether organization resources are exposed to external system spheres by permitting or prohibiting their use.
AC-21Information SharingACThe control ensures information is not released into a security sphere where the recipient lacks matching access authorizations.
AC-22Publicly Accessible ContentACThe control ensures information resources are not exposed to the incorrect (public) sphere through review and authorization.
MP-2Media AccessMPThe control prevents exposure of the media resource to the wrong security sphere.
MP-3Media MarkingMPMarking prevents media containing sensitive data from being moved or accessed within an inappropriate security sphere by making sensitivity visible to handlers.
MP-5Media TransportMPProtecting media during transport prevents exposure of resources to the wrong control sphere.
PE-17Alternate Work SitePERequiring controls and assessments at alternate work sites prevents exposure of resources to the wrong sphere by ensuring they remain protected outside the primary facility.
PE-23Facility LocationPEPlanning facility placement prevents exposure of critical resources to environmental or physical threat spheres.
PE-4Access Control for TransmissionPEPrevents transmission resources from being exposed to an unauthorized physical sphere by limiting who can approach distribution lines.
PM-17Protecting Controlled Unclassified Information on External SystemsPMDrives controls that keep sensitive CUI from being exposed to external systems as an unintended sphere.
PM-5System InventoryPMAsset tracking reveals resources that have inadvertently entered an unintended security sphere, permitting corrective isolation.
CA-9Internal System ConnectionsCAControlling internal connections prevents exposure of resources to unintended internal spheres.
Show 12 more broadly-applicable controls
SC-32System PartitioningSCPrevents resources from residing in the wrong sphere by design through explicit domain separation.
SC-36Distributed Processing and StorageSCPlacing components in separate spheres limits the blast radius of any exposure, reducing the chance that a resource is reachable from an unintended domain.
SC-39Process IsolationSCProcess isolation ensures resources remain inside their intended spheres, preventing exposure of a resource to an unintended process.
SC-42Sensor Capability and DataSCBy restricting sensor activation and surfacing its use, the control prevents sensor data from being transferred into an unintended sphere (e.g., attacker-controlled processes or remote exfiltration).
SC-46Cross Domain Policy EnforcementSCThe control ensures resources are not exposed outside their intended security domain by filtering transfers at the domain boundary.
SC-7Boundary ProtectionSCInternal resources are kept in separate network spheres from externally accessible components.
AC-23Data Mining ProtectionACProtects against data mining that would expose resources to unauthorized spheres by enforcing detection and controls.
AC-4Information Flow EnforcementACRestricts information flows to ensure resources are not exposed to incorrect or unauthorized spheres.
CM-12Information LocationCMKnowing exact processing and storage locations helps avoid exposure of resources to incorrect spheres.
RA-6Technical Surveillance Countermeasures SurveyRABy locating and eliminating surveillance devices, TSCM prevents resources from being exposed to an adversary-controlled sphere.
SI-23Information FragmentationSIDistributing fragments into separate spheres means a resource leak or exposure on one system does not place the full sensitive information into the wrong sphere.
SR-12Component DisposalSREnsures components are not exposed to an external or disposal sphere while still containing sensitive data or resources.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2022-399527.69.80.93782023-02-16
CVE-2018-69106.97.50.90542018-02-13
CVE-2020-273616.97.50.89352021-07-01
CVE-2021-454206.99.80.82252022-02-14
CVE-2024-251536.99.80.82222024-03-13
CVE-2023-375996.67.50.85612023-07-13
CVE-2022-249006.49.90.73292022-04-29
CVE-2023-335105.87.50.71482023-06-07
CVE-2019-129285.29.80.54092019-06-24
CVE-2022-340475.17.50.59182022-07-20
CVE-2022-318454.77.50.53122022-06-14
CVE-2018-78464.69.80.43322019-05-22
CVE-2017-165984.38.80.42982018-01-23
CVE-2017-166064.38.80.42982018-01-23
CVE-2021-377044.35.40.53142021-08-12
CVE-2017-165974.19.80.36112018-01-23
CVE-2021-463543.97.50.39202022-02-09
CVE-2023-376453.95.30.47842023-07-20
CVE-2017-02153.85.30.45002017-06-15
CVE-2017-166103.89.80.31252018-01-23
CVE-2023-29163.37.50.29502023-08-15
CVE-2017-56483.19.10.21762017-04-17
CVE-2022-318463.17.50.26382022-06-14
CVE-2024-407252.65.30.25102024-07-18
CVE-2021-432162.46.50.18232021-12-15