Prerequisites
The attacker must have knowledge of the target’s mobile phone number.
Skills Required
Open source and commercial tools are available for this attack.
Mitigations
Frequent changing of mobile number.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Insertion of Sensitive Information Into Sent Data The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
References
REF-487
Location Leaks on the GSM Air Interface
Denis Foo Kune, John Koelndorfer, Nicholas Hopper, Yongdae Kim.
https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Description Summary, References |