| New Patterns Added |
|---|
| CAPEC-383 | Harvesting Usernames or UserIDs via Application API Event Monitoring |
| CAPEC-384 | Application API Message Manipulation via Man-in-the-Middle |
| CAPEC-385 | Transaction or Event Tampering via Application API Manipulation |
| CAPEC-386 | Application API Navigation Remapping |
| CAPEC-387 | Navigation Remapping To Propagate Malicoius Content |
| CAPEC-388 | Application API Button Hijacking |
| CAPEC-389 | Content Spoofing Via Application API Manipulation |
| CAPEC-390 | Bypassing Physical Security of Systems or Facilities |
| CAPEC-391 | Bypassing Physical Locks |
| CAPEC-392 | Lock Bumping |
| CAPEC-393 | Lock Picking |
| CAPEC-394 | Using a Snap Gun Lock to Force a Lock |
| CAPEC-395 | Bypassing Electronic Locks and Access Controls |
| CAPEC-396 | Bypassing Card or Badge-Based Systems |
| CAPEC-397 | Cloning Magnetic Strip Cards |
| CAPEC-398 | Magnetic Strip Card Brute Force Attacks |
| CAPEC-399 | Cloning RFID Cards or Chips |
| CAPEC-400 | RFID Chip Deactivation or Destruction |
| CAPEC-401 | Hacking Hardware Devices or Components |
| CAPEC-402 | Bypassing ATA Password Security |
| CAPEC-403 | Social Engineering Attacks |
| CAPEC-404 | Social Information Gathering Attacks |
| CAPEC-405 | Social Information Gathering via Research |
| CAPEC-406 | Social Information Gathering via Dumpster Diving |
| CAPEC-407 | Social Information Gathering via Pretexting |
| CAPEC-408 | Information Gathering from Traditional Sources |
| CAPEC-409 | Information Gathering from Non-Traditional Sources |
| CAPEC-410 | Information Elicitation via Social Engineering |
| CAPEC-411 | Pretexting |
| CAPEC-412 | Pretexting via Customer Service |
| CAPEC-413 | Pretexting via Tech Support |
| CAPEC-414 | Pretexting via Delivery Person |
| CAPEC-415 | Pretexting via Phone |
| CAPEC-416 | Target Influence via Social Engineering |
| CAPEC-417 | Target Influence via Perception of Reciprocation |
| CAPEC-418 | Target Influence via Perception of Obligation |
| CAPEC-419 | Target Influence via Perception of Concession |
| CAPEC-420 | Target Influence via Perception of Scarcity |
| CAPEC-421 | Target Influence via Perception of Authority |
| CAPEC-422 | Target Influence via Perception of Commitment and Consistency |
| CAPEC-423 | Target Influence via Perception of Liking |
| CAPEC-424 | Target Influence via Perception of Consensus or Social Proof |
| CAPEC-425 | Target Influence via Framing |
| CAPEC-426 | Target Influence via Manipulation of Incentives |
| CAPEC-427 | Target Influence via Psychological Principles |
| CAPEC-428 | Target Influence via Modes of Thinking |
| CAPEC-429 | Target Influence via Eye Cues |
| CAPEC-430 | Target Influence via Micro-Expressions |
| CAPEC-431 | Target Influence via Neuro-Linguistic Programming (NLP) |
| CAPEC-432 | Target Influence via Voice in NLP |
| CAPEC-433 | Target Influence via The Human Buffer Overflow |
| CAPEC-434 | Target Influence via Interview and Interrogation |
| CAPEC-435 | Target Influence via Instant Rapport |
| CAPEC-437 | Supply Chain Attacks |
| CAPEC-438 | Integrity Modification/Manipulation During Manufacture |
| CAPEC-439 | Integrity Modification during Distribution |
| CAPEC-440 | Integrity Modification During Deployed Use |
| CAPEC-441 | Malicious Logic Inserted Into Product |
| CAPEC-442 | Malicious Logic Inserted Into Product Software |
| CAPEC-443 | Malicious Logic Inserted Into Product Software by Authorized Developer |
| CAPEC-444 | Malicious Logic Insertion into Product Software via Externally Manipulated Component |
| CAPEC-445 | Malicious Logic Insertion into Product Software via Configuration Management Manipulation |
| CAPEC-446 | Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency |
| CAPEC-447 | Malicious Logic Insertion into Product Software during Update |
| CAPEC-448 | Malware Infection into Product Software |
| CAPEC-449 | Malware Propagation via USB Stick |
| CAPEC-450 | Malware Propagation via USB U3 Autorun |
| CAPEC-451 | Malware Propagation via Infected Peripheral Device |
| CAPEC-452 | Malicious Logic Insertion into Product Hardware |
| CAPEC-453 | Malicious Logic Insertion via Counterfeit Hardware |
| CAPEC-454 | Modification of Existing Components with Counterfeit Hardware |
| CAPEC-455 | Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components |
| CAPEC-456 | Malicious Logic Insertion into Product Memory |
| CAPEC-457 | USB Memory Attacks |
| CAPEC-458 | Flash Memory Attacks |
| CAPEC --> CWE Mappings Added |
|---|
| CAPEC-383 Harvesting Usernames or UserIDs via Application API Event Monitoring |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-319 | Cleartext Transmission of Sensitive Information |
| --> | CWE-419 | Unprotected Primary Channel |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-384 Application API Message Manipulation via Man-in-the-Middle |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-385 Transaction or Event Tampering via Application API Manipulation |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-386 Application API Navigation Remapping |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-387 Navigation Remapping To Propagate Malicoius Content |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-388 Application API Button Hijacking |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |
| CAPEC-389 Content Spoofing Via Application API Manipulation |
| --> | CWE-311 | Missing Encryption of Sensitive Data |
| --> | CWE-345 | Insufficient Verification of Data Authenticity |
| --> | CWE-346 | Origin Validation Error |
| --> | CWE-602 | Client-Side Enforcement of Server-Side Security |