结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: unkown
The software establishes a communication channel with an endpoint and receives a message from that endpoint, but it does not sufficiently ensure that the message was not modified during transmission.
A man-in-the-middle (MITM) attacker might be able to modify the message and spoof the endpoint.
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1003 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Integrity', 'Confidentiality'] | Gain Privileges or Assume Identity | If an attackers can spoof the endpoint, the attacker gains all the privileges that were intended for the original endpoint. |