Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-607:Obstruction
Attack Pattern ID:607
Version:v3.9
Attack Pattern Name:Obstruction
Abstraction:Meta
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
An attacker obstructs the interactions between system components. By interrupting or disabling these interactions, an adversary can often force the system into a degraded state or cause the system to stop working as intended. This can cause the system components to be unavailable until the obstruction mitigated.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ParentOfS547Physical Destruction of Device or Component
ParentOfS582Route Disabling
ParentOfS601Jamming
ParentOfS603Blockage
CanFollowM548Contaminate Resource
Nature: ParentOf
Type: Standard
ID: 547
Name: Physical Destruction of Device or Component
Nature: ParentOf
Type: Standard
ID: 582
Name: Route Disabling
Nature: ParentOf
Type: Standard
ID: 601
Name: Jamming
Nature: ParentOf
Type: Standard
ID: 603
Name: Blockage
Nature: CanFollow
Type: Meta
ID: 548
Name: Contaminate Resource
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
AvailabilityN/AResource ConsumptionN/A
Scope: Availability
Likelihood: N/A
Impact: Resource Consumption
Note: N/A
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Details not found