CAPEC-220 Client-Server Protocol Manipulation

CAPEC ID: 220

CAPEC-220 Metadata

Likelihood of Attack

High

Typical Severity

Medium

Overview

Summary

An adversary takes advantage of weaknesses in the protocol by which a client and server are communicating to perform unexpected actions. Communication protocols are necessary to transfer messages between client and server applications. Moreover, different protocols may be used for different types of interactions.

Prerequisites

The client and/or server must utilize a protocol that has a weakness allowing manipulation of the interaction.

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

Related CAPECs

CAPEC ID Description
CAPEC-272 An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.