CAPEC-623 Compromising Emanations Attack

CAPEC ID: 623

CAPEC-623 Metadata

Likelihood of Attack

High

Typical Severity

Low

Overview

Summary

Compromising Emanations (CE) are defined as unintentional signals which an attacker may intercept and analyze to disclose the information processed by the targeted equipment. Commercial mobile devices and retransmission devices have displays, buttons, microchips, and radios that emit mechanical emissions in the form of sound or vibrations. Capturing these emissions can help an adversary understand what the device is doing.

Prerequisites

Proximal access to the device.

Potential Solutions / Mitigations

None are known.

Related Weaknesses (CWE)

CWE ID Description
CWE-201 Insertion of Sensitive Information Into Sent Data

Related CAPECs

CAPEC ID Description
CAPEC-189 An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis typically involves interacting with the software at the boundaries of where the software interfaces with a larger execution environment, such as input-output vectors, libraries, or APIs. Black Box Reverse Engineering also refers to gathering physical side effects of a hardware device, such as electromagnetic radiation or sounds.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.