CAPEC 217 Exploiting Incorrectly Configured SSL/TLS

Draft Standard Low Risk

Description

An adversary takes advantage of incorrectly configured SSL/TLS communications that enables access to data intended to be encrypted. The adversary may also use this type of attack to inject commands or other traffic into the encrypted stream to cause compromise of either the client or server.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships

Resources Required

1