CAPEC Details
Name Protocol Manipulation
Likelyhood of attack Typical severity
Low Medium
Summary An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.
Prerequisites The protocol or implementations thereof must contain bugs that an adversary can exploit.