Dark Mode

Settings

Capec-272 Detail

Protocol Manipulation

Meta Communications Software Typical Severity: Medium

Children: 90 220 276 277 278

Threats: T62 T106 T109 T272 T294

Description

An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.

Not present

External ID Source Link Description
CAPEC-272 capec https://capec.mitre.org/data/definitions/272.html

Not present

  1. The protocol or implementations thereof must contain bugs that an adversary can exploit.
  1. In some variants of this attack the adversary must be able to intercept communications using the protocol. This means they need to be able to receive the communications from one participant and prevent the other participant from receiving these communications.

Not present

Not present

Not present