Adversaries may attempt to position themselves between two or more networked devices using a man-in-the-middle (MiTM) technique to support follow-on behaviors such as Network Sniffing or Transmitted Data Manipulation. By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)
Adversaries may leverage the MiTM position to attempt to modify traffic, such as in Transmitted Data Manipulation. Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-16 | Security and Privacy Attributes | Protects | T1557 | Man-in-the-Middle | |
AC-17 | Remote Access | Protects | T1557 | Man-in-the-Middle | |
AC-18 | Wireless Access | Protects | T1557 | Man-in-the-Middle | |
AC-19 | Access Control for Mobile Devices | Protects | T1557 | Man-in-the-Middle | |
AC-20 | Use of External Systems | Protects | T1557 | Man-in-the-Middle | |
AC-3 | Access Enforcement | Protects | T1557 | Man-in-the-Middle | |
AC-4 | Information Flow Enforcement | Protects | T1557 | Man-in-the-Middle | |
CA-7 | Continuous Monitoring | Protects | T1557 | Man-in-the-Middle | |
CM-2 | Baseline Configuration | Protects | T1557 | Man-in-the-Middle | |
CM-6 | Configuration Settings | Protects | T1557 | Man-in-the-Middle | |
CM-7 | Least Functionality | Protects | T1557 | Man-in-the-Middle | |
CM-8 | System Component Inventory | Protects | T1557 | Man-in-the-Middle | |
RA-5 | Vulnerability Monitoring and Scanning | Protects | T1557 | Man-in-the-Middle | |
SC-23 | Session Authenticity | Protects | T1557 | Man-in-the-Middle | |
SC-4 | Information in Shared System Resources | Protects | T1557 | Man-in-the-Middle | |
SC-46 | Cross Domain Policy Enforcement | Protects | T1557 | Man-in-the-Middle | |
SC-7 | Boundary Protection | Protects | T1557 | Man-in-the-Middle | |
SC-8 | Transmission Confidentiality and Integrity | Protects | T1557 | Man-in-the-Middle | |
SI-10 | Information Input Validation | Protects | T1557 | Man-in-the-Middle | |
SI-12 | Information Management and Retention | Protects | T1557 | Man-in-the-Middle | |
SI-15 | Information Output Filtering | Protects | T1557 | Man-in-the-Middle | |
SI-3 | Malicious Code Protection | Protects | T1557 | Man-in-the-Middle | |
SI-4 | System Monitoring | Protects | T1557 | Man-in-the-Middle | |
SI-7 | Software, Firmware, and Information Integrity | Protects | T1557 | Man-in-the-Middle | |
CVE-2019-1860 | Cisco Unified Intelligence Center | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-1941 | Cisco Identity Services Engine Software | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-1838 | Cisco Application Policy Infrastructure Controller (APIC) | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-3233 | Cisco IOx | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-15280 | Cisco Firepower Management Center | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-3137 | Cisco Email Security Appliance (ESA) | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-1943 | Cisco Small Business 300 Series Managed Switches | exploitation_technique | T1557 | Man-in-the-Middle | |
CVE-2019-1665 | Cisco HyperFlex HX-Series | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-15994 | Cisco Stealthwatch Enterprise | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2018-15393 | Cisco Content Security Management Appliance (SMA) | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-3121 | Cisco 550X Series Stackable Managed Switches | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-1715 | Cisco Adaptive Security Appliance (ASA) Software | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-3356 | Cisco Data Center Network Manager | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-3349 | Cisco Data Center Network Manager | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-3754 | Unity Operating Environment | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5336 | RSA Archer | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2018-15784 | Dell Networking OS10 | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2018-11087 | Spring AMQP | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5269 | PrestaShop | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-11030 | WordPress | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-11023 | jQuery | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5270 | PrestaShop | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5264 | PrestaShop | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-11035 | GLPI | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-11082 | Kaminari | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-15093 | tough | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5266 | ps_linklist | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2020-5271 | PrestaShop | secondary_impact | T1557 | Man-in-the-Middle | |
CVE-2019-6538 | Medtronic Conexus Radio Frequency Telemetry Protocol | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2018-10610 | LeviStudioU | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2018-14809 | V-Server | primary_impact | T1557 | Man-in-the-Middle | |
CVE-2012-3015 | n/a | uncategorized | T1557 | Man-in-the-Middle | |
CVE-2014-4077 | n/a | uncategorized | T1557 | Man-in-the-Middle | |
CVE-2018-0622 | DHC Online Shop App for Android | uncategorized | T1557 | Man-in-the-Middle | |
CVE-2015-7931 | n/a | uncategorized | T1557 | Man-in-the-Middle | |
CVE-2014-3566 | n/a | uncategorized | T1557 | Man-in-the-Middle | |
CVE-2018-16179 | Mizuho Direct App for Android | uncategorized | T1557 | Man-in-the-Middle | |
action.hacking.variety.MitM | Man-in-the-middle attack. Child of 'Exploit vuln'. | related-to | T1557 | Man-in-the-Middle | |
action.hacking.variety.Routing detour | Routing detour. Child of 'Exploit vuln'. | related-to | T1557 | Man-in-the-Middle | |
aws_rds | AWS RDS | technique_scores | T1557 | Man-in-the-Middle |
Comments
AWS RDS and AWS RDS Proxy support TLS/SSL connections to database instances which protects against man-in-the-middle attacks. However, given that it does not support any sub-techniques, the mapping is given a score of Partial.
References
|
aws_config | AWS Config | technique_scores | T1557 | Man-in-the-Middle |
Comments
The following AWS Config managed rules can identify configuration problems that should be fixed in order to ensure SSL/TLS encryption is enabled to protect network traffic: "acm-certificate-expiration-check" for nearly expired certificates in AWS Certificate Manager (ACM); "alb-http-to-https-redirection-check" for Application Load Balancer (ALB) HTTP listeners; "api-gw-ssl-enabled" for API Gateway REST API stages; "cloudfront-custom-ssl-certificate", "cloudfront-sni-enabled", and "cloudfront-viewer-policy-https", for Amazon CloudFront distributions; "elb-acm-certificate-required", "elb-custom-security-policy-ssl-check", "elb-predefined-security-policy-ssl-check", and "elb-tls-https-listeners-only" for Elastic Load Balancing (ELB) Classic Load Balancer listeners; "redshift-require-tls-ssl" for Amazon Redshift cluster connections to SQL clients; "s3-bucket-ssl-requests-only" for requests for S3 bucket contents; and "elasticsearch-node-to-node-encryption-check" for Amazon ElasticSearch Service node-to-node communications.
All of these are run on configuration changes except "alb-http-to-https-redirection-check", which is run periodically. Coverage factor is partial for these rules, since they are specific to a subset of the available AWS services and can only mitigate behavior for adversaries who are unable to decrypt the relevant traffic. This control does not provide specific coverage for this technique's sub-techniques, resulting in an overall score of Minimal.
References
|
aws_iot_device_defender | AWS IoT Device Defender | technique_scores | T1557 | Man-in-the-Middle |
Comments
The following AWS IoT Device Defender audit checks and corresponding mitigation actions can identify and resolve configuration problems that should be fixed in order to ensure SSL/TLS encryption is enabled and secure to protect network traffic to/from IoT devices: "CA certificate expiring" ("CA_CERTIFICATE_EXPIRING_CHECK" in the CLI and API), "CA certificate key quality" ("CA_CERTIFICATE_KEY_QUALITY_CHECK" in the CLI and API), and "CA certificate revoked but device certificates still active" ("REVOKED_CA_CERTIFICATE_STILL_ACTIVE_CHECK" in the CLI and API) can identify problems with certificate authority (CA) certificates being used for signing and support the "UPDATE_CA_CERTIFICATE" mitigation action which can resolve them. "Device certificate expiring" ("DEVICE_CERTIFICATE_EXPIRING_CHECK" in the CLI and API), "Device certificate key quality" ("DEVICE_CERTIFICATE_KEY_QUALITY_CHECK" in the CLI and API), "Device certificate shared" ("DEVICE_CERTIFICATE_SHARED_CHECK" in the CLI and API), and "Revoked device certificate still active" ("REVOKED_DEVICE_CERTIFICATE_STILL_ACTIVE_CHECK" in the CLI and API) can identify problems with IoT devices' certificates and support the "UPDATE_DEVICE_CERTIFICATE" and "ADD_THINGS_TO_THING_GROUP" mitigation actions which can resolve them.
Coverage factor is partial for these checks and mitigations, since they are specific to IoT device communication and can only mitigate behavior for adversaries who are unable to decrypt the relevant traffic, resulting in an overall score of Partial. This control does not provide specific coverage for this technique's sub-techniques, resulting in an overall score of Minimal.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | technique_scores | T1557 | Man-in-the-Middle |
Comments
The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can mitigate Man-in-the-Middle attacks that manipulate network protocol data in transit. VPC Peering can also be utilized to route traffic privately between two VPCs which can reduce the Man-in-the-Middle attack surface. VPC Endpoints can also similarly reduce the attack surface of Man-in-the-Middle attacks by ensuring network traffic between a VPC and supported AWS services are not exposed to the Internet.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1557.002 | ARP Cache Poisoning | 24 |
T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | 17 |