CAPEC-541 Application Fingerprinting

CAPEC ID: 541

CAPEC-541 Metadata

Likelihood of Attack

Low

Typical Severity

Low

Overview

Summary

An adversary engages in fingerprinting activities to determine the type or version of an application installed on a remote target.

Prerequisites

None

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-204 Observable Response Discrepancy
CWE-205 Observable Behavioral Discrepancy
CWE-208 Observable Timing Discrepancy

Related CAPECs

CAPEC ID Description
CAPEC-224 An adversary compares output from a target system to known indicators that uniquely identify specific details about the target. Most commonly, fingerprinting is done to determine operating system and application versions. Fingerprinting can be done passively as well as actively. Fingerprinting by itself is not usually detrimental to the target. However, the information gathered through fingerprinting often enables an adversary to discover existing weaknesses in the target.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1592.002 Gather Victim Host Information: Software

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.