CAPEC-2 Metadata
Likelihood of Attack
High
Typical Severity
Medium
Overview
Summary
An attacker leverages the security functionality of the system aimed at thwarting potential attacks to launch a denial of service attack against a legitimate system user. Many systems, for instance, implement a password throttling mechanism that locks an account after a certain number of incorrect log in attempts. An attacker can leverage this throttling mechanism to lock a legitimate user out of their own account. The weakness that is being leveraged by an attacker is the very security feature that has been put in place to counteract attacks.
Prerequisites
The system has a lockout mechanism. An attacker must be able to reproduce behavior that would result in an account being locked.
Execution Flow
Step | Phase | Description | Techniques |
---|---|---|---|
1 | Experiment | [Investigate account lockout behavior of system] Investigate the security features present in the system that may trigger an account lockout |
|
2 | Experiment | [Obtain list of user accounts to lock out] Generate a list of valid user accounts to lock out |
|
3 | Exploit | [Lock Out Accounts] Perform lockout procedure for all accounts that the attacker wants to lock out. |
|
Potential Solutions / Mitigations
Implement intelligent password throttling mechanisms such as those which take IP address into account, in addition to the login name. When implementing security features, consider how they can be misused and made to turn on themselves.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-645 | Overly Restrictive Account Lockout Mechanism |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-212 | An adversary leverages a legitimate capability of an application in such a way as to achieve a negative technical impact. The system functionality is not altered or modified but used in a way that was not intended. This is often accomplished through the overuse of a specific functionality or by leveraging functionality with design flaws that enables the adversary to gain access to unauthorized, sensitive data. |
Taxonomy Mappings
Taxonomy: ATTACK
Entry ID | Entry Name |
---|---|
1531 | Account Access Removal |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.