An attacker may take advantage of communications protocol by influencing or manipulating a security setting or parameter to cause compromise to the communications. This can result in the disclosure of information, insertion or removal of information from the communications stream, and even include remote system compromise.
Access to the communication stream.
The attacker needs the ability to sniff traffic, and optionally be able to route said traffic to a system where the sniffing of traffic can take place, and act upon the recovered traffic in real time.
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
December 07, 2015
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the