CAPEC-94: Adversary in the Middle (AiTM)

Description
<p>An adversary targets the communication between two components (typically client and server), in order to alter or obtain data from transactions. A general approach entails the adversary placing themself within the communication channel between the two components.<p>
Extended Description

Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first flows through the adversary, who has the opportunity to observe or alter it, before being passed on to the intended recipient as if it was never observed. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for these attacks yields an implicit lack of trust in communication or identify between two components.

These attacks differ from Sniffing Attacks (CAPEC-157) since these attacks often modify the communications prior to delivering it to the intended recipient.

Severity :

Very High

Possibility :

High

Type :

Meta
Prerequisites

This table shows the other attack patterns and high level categories that are related to this attack pattern.

  • There are two components communicating with each other.
  • An attacker is able to identify the nature and mechanism of communication between the two target components.
  • An attacker can eavesdrop on the communication between the target components.
  • Strong mutual authentication is not used between the two target components yielding opportunity for attacker interposition.
  • The communication occurs in clear (not encrypted) or with insufficient and spoofable encryption.
Skills required

This table shows the other attack patterns and high level categories that are related to this attack pattern.

  • Medium This attack can get sophisticated since the attack may use cryptography.
Taxonomy mappings

Visit http://capec.mitre.org/ for more details.