logo
Home/CWEs/CWE-524/

CWE-524 - Use of Cache Containing Sensitive Information

  • Abstraction:Base
  • Structure:Simple
  • Status:Incomplete
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Use of Cache Containing Sensitive Information

Description

The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere.

Applications may use caches to improve efficiency when communicating with remote entities or performing intensive calculations. A cache maintains a pool of objects, threads, connections, pages, financial data, passwords, or other resources to minimize the time it takes to initialize and access these resources. If the cache is accessible to unauthorized actors, attackers can read the cache and obtain this sensitive information.

Common Consequences

Scope: Confidentiality

Impact: Read Application Data

Related Weaknesses

CWE-668Exposure of Resource to Wrong Sphere

Related Alerts

Non-Storable ContentInformational

Storable but Non-Cacheable ContentInformational

Storable and Cacheable ContentInformational