Attackers might be able to spoof the intended endpoint from a different system or process, thus gaining the same level of access as the intended endpoint.
While this issue frequently involves authentication between network-based clients and servers, other types of communication channels and endpoints can have this weakness.
Scope | Impact | Likelihood |
---|---|---|
Integrity Confidentiality | Gain Privileges or Assume Identity Note: If an attacker can spoof the endpoint, the attacker gains all the privileges that were intended for the original endpoint. |
References | Description |
---|---|
CVE-2022-30319 | S-bus functionality in a home automation product performs access control using an IP allowlist, which can be bypassed by a forged IP address. |
CVE-2022-22547 | A troubleshooting tool exposes a web server on a random port between 9000-65535 that could be used for information gathering |
CVE-2022-4390 | A WAN interface on a router has firewall restrictions enabled for IPv4, but it does not for IPv6, which is enabled by default |
CVE-2012-2292 | Product has a Silverlight cross-domain policy that does not restrict access to another application, which allows remote attackers to bypass the Same Origin Policy. |
CVE-2012-5810 | Mobile banking application does not verify hostname, leading to financial loss. |
CVE-2014-1266 | chain: incorrect "goto" in Apple SSL product bypasses certificate validation, allowing Adversry-in-the-Middle (AITM) attack (Apple "goto fail" bug). CWE-705 (Incorrect Control Flow Scoping) -> CWE-561 (Dead Code) -> CWE-295 (Improper Certificate Validation) -> CWE-393 (Return of Wrong Status Code) -> CWE-300 (Channel Accessible by Non-Endpoint). |
CVE-2000-1218 | DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-161 | Infrastructure Manipulation An attacker exploits characteristics of the infrastructure of a network entity in order to perpetrate attacks or information gathering on network objects or effect a change in the ordinary information flow between network objects. Most often, this involves manipulation of the routing of network messages so, instead of arriving at their proper destination, they are directed towards an entity of the attackers' choosing, usually a server controlled by the attacker. The victim is often unaware that their messages are not being processed correctly. For example, a targeted client may believe they are connecting to their own bank but, in fact, be connecting to a Pharming site controlled by the attacker which then collects the user's login information in order to hijack the actual bank account. |
CAPEC-481 | Contradictory Destinations in Traffic Routing Schemes Adversaries can provide contradictory destinations when sending messages. Traffic is routed in networks using the domain names in various headers available at different levels of the OSI model. In a Content Delivery Network (CDN) multiple domains might be available, and if there are contradictory domain names provided it is possible to route traffic to an inappropriate destination. The technique, called Domain Fronting, involves using different domain names in the SNI field of the TLS header and the Host field of the HTTP header. An alternative technique, called Domainless Fronting, is similar, but the SNI field is left blank. |
CAPEC-501 | Android Activity Hijack An adversary intercepts an implicit intent sent to launch a Android-based trusted activity and instead launches a counterfeit activity in its place. The malicious activity is then used to mimic the trusted activity's user interface and prompt the target to enter sensitive data as if they were interacting with the trusted activity. |
CAPEC-697 | DHCP Spoofing An adversary masquerades as a legitimate Dynamic Host Configuration Protocol (DHCP) server by spoofing DHCP traffic, with the goal of redirecting network traffic or denying service to DHCP. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 2.5 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Description, Name, Relationships | |
CWE Content Team | MITRE | updated Modes_of_Introduction, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Maintenance_Notes | |
CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Description, Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Demonstrative_Examples |