Dark Mode

Settings

Capec-276 Detail

Inter-component Protocol Manipulation

Standard Communications Software

Parents: 272

Children: 665

Threats: T272 T294

Description

Inter-component protocols are used to communicate between different software and hardware modules within a single computer. Common examples are: interrupt signals and data pipes. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.

Not present

External ID Source Link Description
CAPEC-276 capec https://capec.mitre.org/data/definitions/276.html
CWE-707 cwe http://cwe.mitre.org/data/definitions/707.html

Not present

Not present

Not present

Not present

Not present

Not present