| Name |
Protocol Analysis |
|
| Likelyhood of attack |
Typical severity |
| Low |
Low |
|
| Summary |
An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analysis of a networking protocol inherently, it does not require the presence of an actual or physical network. |
| Prerequisites |
Access to a binary executable. The ability to observe and interact with a communication channel between communicating processes. |
| Solutions | |
| Related Weaknesses |
|
CWE ID
|
Description
|
| CWE-326 |
Inadequate Encryption Strength |
|