CAPEC-596 TCP RST Injection

CAPEC ID: 596

CAPEC-596 Metadata

Likelihood of Attack

High

Typical Severity

Very High

Overview

Summary

An adversary injects one or more TCP RST packets to a target after the target has made a HTTP GET request. The goal of this attack is to have the target and/or destination web server terminate the TCP connection.

Prerequisites

An On/In Path Device

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-940 Improper Verification of Source of a Communication Channel

Related CAPECs

CAPEC ID Description
CAPEC-595 In this attack pattern, an adversary injects a connection reset packet to one or both ends of a target's connection. The attacker is therefore able to have the target and/or the destination server sever the connection without having to directly filter the traffic between them.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.