Vereisten
None
Mitigaties
Commercial defensive technology that monitors for rogue Wi-Fi access points, adversary-in-the-middle attacks, and anomalous activity with the mobile device baseband radios.
Gerelateerde zwakheden
| CWE-ID |
Zwakheidsnaam |
|
Channel Accessible by Non-Endpoint The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint. |
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Description, Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Description, Mitigations |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Related_Attack_Patterns |