Dark Mode

Settings

Capec-113 Detail

Interface Manipulation

Meta Software Hardware Likelihood: Medium Typical Severity: Medium

Children: 36 121 133 160

Threats: T62

Description

An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/or execute functionality not intended by the interface implementation, possibly compromising the system which integrates the interface. Interface manipulation can take on a number of forms including forcing the unexpected use of an interface or the use of an interface in an unintended way.

Not present

External ID Source Link Description
CAPEC-113 capec https://capec.mitre.org/data/definitions/113.html
CWE-1192 cwe http://cwe.mitre.org/data/definitions/1192.html

Not present

  1. The target system must expose interface functionality in a manner that can be discovered and manipulated by an adversary. This may require reverse engineering the interface or decrypting/de-obfuscating client-server exchanges.
  1. The requirements vary depending upon the nature of the interface. For example, application-layer APIs related to the processing of the HTTP protocol may require one or more of the following: an Adversary-In-The-Middle (CAPEC-94) proxy, a web browser, or a programming/scripting language.

Not present

Not present

  1. An adversary may make a request to an application that leverages a non- standard API that is known to incorrectly validate its data and thus it may be manipulated by supplying metacharacters or alternate encodings as input, resulting in any number of injection flaws, including SQL injection, cross- site scripting, or command execution.
  2. API methods not intended for production, such as debugging or testing APIs, may not be disabled when deploying in a production environment. As a result, dangerous functionality can be exposed within the production environment, which an adversary can leverage to execute additional attacks.
  3. SoC components contain insufficient identifiers, which allows an adversary to reset the device at will or read sensitive data from the device.