Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-276:Inter-component Protocol Manipulation
Attack Pattern ID:276
Version:v3.9
Attack Pattern Name:Inter-component Protocol Manipulation
Abstraction:Standard
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
Inter-component protocols are used to communicate between different software and hardware modules within a single computer. Common examples are: interrupt signals and data pipes. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM272Protocol Manipulation
ParentOfD665Exploitation of Thunderbolt Protection Flaws
Nature: ChildOf
Type: Meta
ID: 272
Name: Protocol Manipulation
Nature: ParentOf
Type: Detailed
ID: 665
Name: Exploitation of Thunderbolt Protection Flaws
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
CWE-707Improper Neutralization
ID: CWE-707
Name: Improper Neutralization
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Details not found