Name |
Communication Channel Manipulation |
|
Likelyhood of attack |
Typical severity |
High |
Low |
|
Summary |
An adversary manipulates a setting or parameter on communications channel in order to compromise its security. This can result in information exposure, insertion/removal of information from the communications stream, and/or potentially system compromise. |
Prerequisites |
The target application must leverage an open communications channel. The channel on which the target communicates must be vulnerable to interception (e.g., adversary in the middle attack - CAPEC-94). |
Solutions | Encrypt all sensitive communications using properly-configured cryptography. Design the communication system such that it associates proper authentication/authorization with each channel/message. |
Related Weaknesses |
CWE ID
|
Description
|
CWE-306 |
Missing Authentication for Critical Function |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-94 |
An adversary targets the communication between two components (typically client and server), in order to alter or obtain data from transactions. A general approach entails the adversary placing themself within the communication channel between the two components. |
|