Vereisten
The attacker must have knowledge of the target’s mobile phone number.
Vereiste vaardigheden
Open source and commercial tools are available for this attack.
Mitigaties
Frequent changing of mobile number.
Gerelateerde zwakheden
| CWE-ID |
Zwakheidsnaam |
|
Insertion of Sensitive Information Into Sent Data The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Referenties
REF-487
Location Leaks on the GSM Air Interface
Denis Foo Kune, John Koelndorfer, Nicholas Hopper, Yongdae Kim.
https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Description Summary, References |