[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

ID: 300Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Class





Description

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Extended Description

In order to establish secure communication between two parties, it is often important to adequately verify the identity of entities at each end of the communication channel. Inadequate or inconsistent verification may result in insufficient or incorrect identification of either communicating entity. This can have negative consequences such as misplaced trust in the entity at the other end of the channel. An attacker can leverage this by interposing between the communicating entities and masquerading as the original entity. In the absence of sufficient verification of identity, such an attacker can eavesdrop and potentially modify the communication between the original entities.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
Integrity
Access_Control
 
Read application data
Modify application data
Gain privileges / assume identity
 
An attacker could pose as one of the entities and read or possibly modify the communication.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Implementation
 
 Always fully authenticate both ends of any communications channel.
 
  
Architecture and Design
 
 Adhere to the principle of complete mediation.
 
  
Implementation
 
 A certificate binds an identity to a cryptographic key to authenticate a communicating party. Often, the certificate takes the encrypted form of the hash of the identity of the subject, the public key, and information such as time of issue or expiration using the issuer's private key. The certificate can be validated by deciphering the certificate with the issuer's public key. See also X.509 certificate signature chains and the PGP certification structure.
 
  

Relationships

Related CWETypeViewChain
CWE-300 ChildOf CWE-902 Category CWE-888  

Demonstrative Examples   (Details)

  1. In the Java snippet below, data is sent over an unencrypted channel to a remote server. By eavesdropping on the communication channel or posing as the endpoint, an attacker would be able to read all of the transmitted data.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Man-in-the-middle (MITM)
 
 
WASC 32
 
Routing Detour
 
 
CERT Java Secure Coding SEC06-J
 
Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar
 
 

References:

  1. M. Bishop .Computer Security: Art and Science. Addison-Wesley. Published on 2003.
CVE    4
SVE-001562
CVE-2021-32926
CVE-2017-12735
CVE-2019-14899
...

© SecPod Technologies