Threat actors may gather information about the victim spacecraft's descriptors that can be used for future campaigns or to help perpetuate other techniques. Information about the descriptors may include a variety of details such as identity attributes, organizational structures, and mission operational parameters.
| Priority 1 | Priority 2 | Priority 3 | Priority 4 | 
| CWE-285: Improper Authorization | CWE-200: Information Exposure | ||
| CWE-522: Insufficiently Protected Credentials | 
| ID | Name | Description | STIX Pattern |