logo

200 Traceability loss


Description

Some features of the application do not properly keep track of errors, exceptional events or critical actions on the system, hidering the detection of possible security events.


Impact

Lose the tracking of exceptional events and fail to detect potential security breaches.


Recommendation

Set alerts for errors, events and critical actions using the mechanisms available by the technology stack.


Threat

Unauthorized internal attacker.


Expected Remediation Time

30 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: H
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Fixes


Last updated

2024/02/16