Home > CAPEC List > CAPEC-272: Protocol Manipulation (Version 2.11)  

CAPEC-272: Protocol Manipulation

Protocol Manipulation
Definition in a New Window Definition in a New Window
Attack Pattern ID: 272
Abstraction: Meta
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.

+ Attack Prerequisites
  • The protocol or implementations thereof must contain bugs that an adversary can exploit.

+ Typical Severity


+ Resources Required

In some variants of this attack the adversary must be able to intercept communications using the protocol. This means they need to be able to receive the communications from one participant and prevent the other participant from receiving these communications.

+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017