Home > CAPEC List > CAPEC-627: Counterfeit GPS Signals (Version 2.11)  

CAPEC-627: Counterfeit GPS Signals

 
Counterfeit GPS Signals
Definition in a New Window Definition in a New Window
Attack Pattern ID: 627
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary attempts to deceive a GPS receiver by broadcasting counterfeit GPS signals, structured to resemble a set of normal GPS signals. These spoofed signals may be structured in such a way as to cause the receiver to estimate its position to be somewhere other than where it actually is, or to be located where it is but at a different time, as determined by the adversary.

+ Attack Prerequisites
  • The target must be relying on valid GPS signal to perform critical operations.

+ Typical Severity

High

+ Typical Likelihood of Exploit

Likelihood: Low

Spoofing GPS signals and having a target receiver use them is not a trivial task.

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: High

The ability to spoof GPS signals is not trival.

+ Resources Required

Ability to create spoofed GPS signals.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Integrity
Modify application data
+ Technical Context
Architectural Paradigms
Mobile
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2017-05-01Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Related_Attack_Patterns, Resources_Required, Typical_Likelihood_of_Exploit, Typical_SeverityInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017