CAPEC-5

Blue Boxing
Mittel
Obsolete
2014-06-23
00h00 +00:00
2023-01-24
00h00 +00:00
Benachrichtigung für ein CAPEC
Bleiben Sie über alle Änderungen zu einem bestimmten CAPEC informiert.
Benachrichtigungen verwalten

CAPEC-Informationen

Voraussetzungen

System must use weak authentication mechanisms for administrative functions.

Erforderliche Kenntnisse

Given a vulnerable phone system, the attackers' technical vector relies on attacks that are well documented in cracker 'zines and have been around for decades.

Erforderliche Ressourcen

CCITT-5 or other vulnerable lines, with the ability to send tones such as combined 2,400 Hz and 2,600 Hz tones to the switch

Gegenmaßnahmen

Implementation: Upgrade phone lines. Note this may be prohibitively expensive
Use strong access control such as two factor access control for administrative access to the switch

Verwandte Schwachstellen

CWE-ID Name der Schwachstelle

CWE-285

Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Referenzen

REF-1

Exploiting Software: How to Break Code
G. Hoglund, G. McGraw.

Einreichung

Name Organisation Datum Veröffentlichungsdatum
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Änderungen

Name Organisation Datum Kommentar
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2023-01-24 +00:00 Updated @Status, Description