CAPEC-5

Blue Boxing
Medio
Obsolete
2014-06-23
00h00 +00:00
2023-01-24
00h00 +00:00
Alerta para un CAPEC
Manténgase informado sobre cualquier cambio en un CAPEC específico.
Gestionar notificaciones

Informaciones CAPEC

Prerrequisitos

System must use weak authentication mechanisms for administrative functions.

Habilidades requeridas

Given a vulnerable phone system, the attackers' technical vector relies on attacks that are well documented in cracker 'zines and have been around for decades.

Recursos requeridos

CCITT-5 or other vulnerable lines, with the ability to send tones such as combined 2,400 Hz and 2,600 Hz tones to the switch

Mitigaciones

Implementation: Upgrade phone lines. Note this may be prohibitively expensive
Use strong access control such as two factor access control for administrative access to the switch

Debilidades relacionadas

CWE-ID Nombre de la debilidad

CWE-285

Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Referencias

REF-1

Exploiting Software: How to Break Code
G. Hoglund, G. McGraw.

Envío

Nombre Organización Fecha Fecha de lanzamiento
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modificaciones

Nombre Organización Fecha Comentario
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2023-01-24 +00:00 Updated @Status, Description