Name |
Protocol Analysis |
|
Likelyhood of attack |
Typical severity |
Low |
Low |
|
Summary |
An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analysis of a networking protocol inherently, it does not require the presence of an actual or physical network. |
Prerequisites |
Access to a binary executable. The ability to observe and interact with a communication channel between communicating processes. |
Solutions | |
Related Weaknesses |
CWE ID
|
Description
|
CWE-326 |
Inadequate Encryption Strength |
|