Conditions préalables
The target must provide content but fail to adequately protect it against modification.The adversary must have the means to alter data to which they are not authorized. If the content is to be modified in transit, the adversary must be able to intercept the targeted messages.
Ressources nécessaires
Array
Faiblesses connexes
| CWE-ID |
Nom de la faiblesse |
|
Insufficient Verification of Data Authenticity The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Soumission
| Nom |
Organisation |
Date |
Date de publication |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
| Nom |
Organisation |
Date |
Commentaire |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Activation_Zone, Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Weaknesses, Resources_Required, Typical_Likelihood_of_Exploit |
| CAPEC Content Team |
The MITRE Corporation |
2017-08-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Prerequisites |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |