Dark Mode
Capec-276 Detail
Inter-component Protocol Manipulation
Standard Communications Software
Parents: 272
Children: 665
Threats: T272 T294
Inter-component protocols are used to communicate between different software and hardware modules within a single computer. Common examples are: interrupt signals and data pipes. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-276 | capec | https://capec.mitre.org/data/definitions/276.html | |
| CWE-707 | cwe | http://cwe.mitre.org/data/definitions/707.html |
Not present
Not present
Not present
Not present
Not present
Not present