CAPEC-595 Connection Reset

CAPEC ID: 595

CAPEC-595 Metadata

Likelihood of Attack

High

Typical Severity

Very High

Overview

Summary

In this attack pattern, an adversary injects a connection reset packet to one or both ends of a target's connection. The attacker is therefore able to have the target and/or the destination server sever the connection without having to directly filter the traffic between them.

Prerequisites

This attack requires the ability to monitor the target's network connection.

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-940 Improper Verification of Source of a Communication Channel

Related CAPECs

CAPEC ID Description
CAPEC-594 An adversary injects traffic into the target's network connection. The adversary is therefore able to degrade or disrupt the connection, and potentially modify the content. This is not a flooding attack, as the adversary is not focusing on exhausting resources. Instead, the adversary is crafting a specific input to affect the system in a particular way.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.