| Name | 
    Inter-component Protocol Manipulation | 
  
  
     | 
    
      
        
        
          | Likelyhood of attack | 
          Typical severity | 
         
        
        
        
          | High | 
          Very High | 
         
        
       
   | 
  
    | Summary | 
    Inter-component protocols are used to communicate between different software and hardware modules within a single computer. Common examples are: interrupt signals and data pipes. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself. | 
  
  
    | Prerequisites | 
     | 
  
  
   | Solutions          |      |  
  
   | Related Weaknesses | 
    
      
        
          
            | 
              CWE ID
             | 
            
              Description
             | 
           
        
        
        
          | CWE-707 | 
          Improper Neutralization | 
         
        
       
     | 
  
  
  
   | Related CAPECS | 
    
      
        
          
            | 
              CAPEC ID
             | 
            
              Description
             | 
           
        
        
        
        
          | CAPEC-272 | 
          An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself. | 
         
        
        
       
     |