CAPEC 36 Using Unpublished Interfaces or Functionality

Draft Standard Medium Risk
Severity High

Description

An adversary searches for and invokes interfaces or functionality that the target system designers did not intend to be publicly available. If interfaces fail to authenticate requests, the attacker may be able to invoke functionality they are not authorized for.

Attack Execution Flow

5

Mitigations

1

Consequences

Relationships

Resources Required

1