Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-121:Exploit Non-Production Interfaces
Attack Pattern ID:121
Version:v3.9
Attack Pattern Name:Exploit Non-Production Interfaces
Abstraction:Standard
Status:Stable
Likelihood of Attack:Low
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description

An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.

▼Extended Description

Non-production interfaces are insecure by default and should not be resident on production systems, since they may reveal sensitive information or functionality that should not be known to end-users. However, such interfaces may be unintentionally left enabled on a production system due to configuration errors, supply chain mismanagement, or other pre-deployment activities.

Ultimately, failure to properly disable non-production interfaces, in a production environment, may expose a great deal of diagnostic information or functionality to an adversary, which can be utilized to further refine their attack. Moreover, many non-production interfaces do not have adequate security controls or may not have undergone rigorous testing since they were not intended for use in production environments. As such, they may contain many flaws and vulnerabilities that could allow an adversary to severely disrupt a target.

▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM113Interface Manipulation
ParentOfD661Root/Jailbreak Detection Evasion via Debugging
Nature: ChildOf
Type: Meta
ID: 113
Name: Interface Manipulation
Nature: ParentOf
Type: Detailed
ID: 661
Name: Root/Jailbreak Detection Evasion via Debugging
▼Execution Flow
Explore
1.

Determine Vulnerable Interface

An adversary explores a target system for sample or test interfaces that have not been disabled by a system administrator and which may be exploitable by the adversary.

Technique
If needed, the adversary explores an organization's network to determine if any specific systems of interest exist.
Exploit
1.

Leverage Test Interface to Execute Attacks

Once an adversary has discovered a system with a non-production interface, the interface is leveraged to exploit the system and/or conduct various attacks.

Technique
The adversary can leverage the sample or test interface to conduct several types of attacks such as Adversary-in-the-Middle attacks (CAPEC-94), keylogging, Cross Site Scripting (XSS), hardware manipulation attacks, and more.
▼Prerequisites
The target must have configured non-production interfaces and failed to secure or remove them when brought into a production environment.
▼Skills Required
High

Exploiting non-production interfaces requires significant skill and knowledge about the potential non-production interfaces left enabled in production.

▼Resources Required
For some interfaces, the adversary will need that appropriate client application or hardware that interfaces with the interface. Other non-production interfaces can be executed using simple tools, such as web browsers or console windows. In some cases, an adversary may need to be able to authenticate to the target before it can access the vulnerable interface.
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
ConfidentialityAccess ControlAuthenticationN/AGain PrivilegesBypass Protection MechanismN/A
ConfidentialityAccess ControlAuthorizationN/ARead DataExecute Unauthorized CommandsN/A
Access ControlIntegrityN/AModify DataAlter Execution LogicN/A
Scope: Confidentiality, Access Control, Authentication
Likelihood: N/A
Impact: Gain Privileges, Bypass Protection Mechanism
Note: N/A
Scope: Confidentiality, Access Control, Authorization
Likelihood: N/A
Impact: Read Data, Execute Unauthorized Commands
Note: N/A
Scope: Access Control, Integrity
Likelihood: N/A
Impact: Modify Data, Alter Execution Logic
Note: N/A
▼Mitigations
Ensure that production systems do not contain non-production interfaces and that these interfaces are only used in development environments.
▼Example Instances
▼Related Weaknesses
IDName
CWE-1209Failure to Disable Reserved Bits
CWE-1259Improper Restriction of Security Token Assignment
CWE-1267Policy Uses Obsolete Encoding
CWE-1270Generation of Incorrect Security Tokens
CWE-1294Insecure Security Identifier Mechanism
CWE-1295Debug Messages Revealing Unnecessary Information
CWE-1296Incorrect Chaining or Granularity of Debug Components
CWE-1302Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
CWE-1313Hardware Allows Activation of Test or Debug Logic at Runtime
CWE-489Active Debug Code
ID: CWE-1209
Name: Failure to Disable Reserved Bits
ID: CWE-1259
Name: Improper Restriction of Security Token Assignment
ID: CWE-1267
Name: Policy Uses Obsolete Encoding
ID: CWE-1270
Name: Generation of Incorrect Security Tokens
ID: CWE-1294
Name: Insecure Security Identifier Mechanism
ID: CWE-1295
Name: Debug Messages Revealing Unnecessary Information
ID: CWE-1296
Name: Incorrect Chaining or Granularity of Debug Components
ID: CWE-1302
Name: Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
ID: CWE-1313
Name: Hardware Allows Activation of Test or Debug Logic at Runtime
ID: CWE-489
Name: Active Debug Code
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Reference ID: REF-588
Title: The Hardware Trojan War: Attacks, Myths, and Defenses
Author: Swarup Bhunia, Mark M. Tehranipoor
Publication:
Publisher:Springer
Edition:
URL:
URL Date:
Day:30
Month:11
Year:2017
Reference ID: REF-589
Title: Exploiting the debug interface to support on-line test of control flow errors
Author: Boyang Du, Matteo Sonza Reorda, Luca Sterpone, Luis Parra, Marta Portela-Garcia, Almudena Lindoso, Luis Entrena
Publication:
Publisher:Institute of Electrical and Electronics Engineers (IEEE)
Edition:
URL:https://ieeexplore.ieee.org/document/6604058/authors#authors
URL Date:2020-07-13
Day:08
Month:07
Year:2013
Details not found