Wymagania wstępne
Knowledge of the target device's or application’s vulnerabilities that can be capitalized on with malicious code. The adversary must be able to place the malicious code on the target device.
Wymagane umiejętności
To deploy a hidden process or malware on the system to automatically collect audio and video data.
Łagodzenie
Prevent unknown code from executing on a system through the use of an allowlist policy.
Patch installed applications as soon as new updates become available.
Powiązane słabości
| CWE-ID |
Nazwa słabości |
|
Privilege Defined With Unsafe Actions A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity. |
Odniesienia
REF-653
What is Car Whisperer?
Amrita Mitra.
https://www.thesecuritybuddy.com/bluetooth-security/what-is-car-whisperer/ REF-654
What is Bluesnarfing?
https://www.finjanmobile.com/what-is-bluesnarfing/
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Example_Instances, References |