CAPEC-479: Malicious Root Certificate

Detailed Stable 严重程度: Low 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary exploits a weakness in authorization and installs a new root certificate on a compromised system. Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to establish a connection to the website. Adversaries have used this technique to avoid security warnings prompting users when compromised systems connect over HTTPS to adversary controlled web servers that spoof legitimate websites in order to collect login credentials.

前提条件

  • The adversary must have the ability to create a new root certificate.

分类映射

分类名称 条目ID 条目名称
ATTACK 1553.004 Subvert Trust Controls:Install Root Certificate
关键信息

CAPEC ID: CAPEC-479

抽象级别: Detailed

状态: Stable

典型严重程度: Low

攻击可能性: Low

相关攻击模式
相关CWE弱点