This vulnerability occurs when an application stores sensitive data, such as passwords or encryption keys, in memory without any form of encryption or protection.
When sensitive information is kept in cleartext within memory, it becomes vulnerable through several common scenarios. This data can be written to disk during system swapping, captured in a crash dump file, or simply remain resident if the memory is not securely wiped before being freed. Even if an attacker lacks direct access to running memory, these secondary exposures create significant risk. While this might seem like a high-privilege attack surface, the real danger lies in these persistent artifacts. Core dumps and swap files often have weak permissions or are bundled into diagnostic archives that are inadvertently shared. Furthermore, uncleared memory can be leaked through other software bugs, allowing attackers to harvest credentials or keys long after the application has finished using them.
Impact: Read Memory