Voraussetzungen
The attacker must have knowledge of the target’s mobile phone number.
Erforderliche Kenntnisse
Open source and commercial tools are available for this attack.
Gegenmaßnahmen
Frequent changing of mobile number.
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Insertion of Sensitive Information Into Sent Data The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Referenzen
REF-487
Location Leaks on the GSM Air Interface
Denis Foo Kune, John Koelndorfer, Nicholas Hopper, Yongdae Kim.
https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Description Summary, References |