T1557 Man-in-the-Middle Mappings

Adversaries may attempt to position themselves between two or more networked devices using a man-in-the-middle (MiTM) technique to support follow-on behaviors such as Network Sniffing or Transmitted Data Manipulation. By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)

Adversaries may leverage the MiTM position to attempt to modify traffic, such as in Transmitted Data Manipulation. Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-16 Security and Privacy Attributes Protects T1557 Man-in-the-Middle
AC-17 Remote Access Protects T1557 Man-in-the-Middle
AC-18 Wireless Access Protects T1557 Man-in-the-Middle
AC-19 Access Control for Mobile Devices Protects T1557 Man-in-the-Middle
AC-20 Use of External Systems Protects T1557 Man-in-the-Middle
AC-3 Access Enforcement Protects T1557 Man-in-the-Middle
AC-4 Information Flow Enforcement Protects T1557 Man-in-the-Middle
CA-7 Continuous Monitoring Protects T1557 Man-in-the-Middle
CM-2 Baseline Configuration Protects T1557 Man-in-the-Middle
CM-6 Configuration Settings Protects T1557 Man-in-the-Middle
CM-7 Least Functionality Protects T1557 Man-in-the-Middle
CM-8 System Component Inventory Protects T1557 Man-in-the-Middle
RA-5 Vulnerability Monitoring and Scanning Protects T1557 Man-in-the-Middle
SC-23 Session Authenticity Protects T1557 Man-in-the-Middle
SC-4 Information in Shared System Resources Protects T1557 Man-in-the-Middle
SC-46 Cross Domain Policy Enforcement Protects T1557 Man-in-the-Middle
SC-7 Boundary Protection Protects T1557 Man-in-the-Middle
SC-8 Transmission Confidentiality and Integrity Protects T1557 Man-in-the-Middle
SI-10 Information Input Validation Protects T1557 Man-in-the-Middle
SI-12 Information Management and Retention Protects T1557 Man-in-the-Middle
SI-15 Information Output Filtering Protects T1557 Man-in-the-Middle
SI-3 Malicious Code Protection Protects T1557 Man-in-the-Middle
SI-4 System Monitoring Protects T1557 Man-in-the-Middle
SI-7 Software, Firmware, and Information Integrity Protects T1557 Man-in-the-Middle
CVE-2019-1860 Cisco Unified Intelligence Center primary_impact T1557 Man-in-the-Middle
CVE-2019-1941 Cisco Identity Services Engine Software secondary_impact T1557 Man-in-the-Middle
CVE-2019-1838 Cisco Application Policy Infrastructure Controller (APIC) secondary_impact T1557 Man-in-the-Middle
CVE-2020-3233 Cisco IOx secondary_impact T1557 Man-in-the-Middle
CVE-2019-15280 Cisco Firepower Management Center secondary_impact T1557 Man-in-the-Middle
CVE-2020-3137 Cisco Email Security Appliance (ESA) secondary_impact T1557 Man-in-the-Middle
CVE-2019-1943 Cisco Small Business 300 Series Managed Switches exploitation_technique T1557 Man-in-the-Middle
CVE-2019-1665 Cisco HyperFlex HX-Series secondary_impact T1557 Man-in-the-Middle
CVE-2019-15994 Cisco Stealthwatch Enterprise secondary_impact T1557 Man-in-the-Middle
CVE-2018-15393 Cisco Content Security Management Appliance (SMA) secondary_impact T1557 Man-in-the-Middle
CVE-2020-3121 Cisco 550X Series Stackable Managed Switches secondary_impact T1557 Man-in-the-Middle
CVE-2019-1715 Cisco Adaptive Security Appliance (ASA) Software primary_impact T1557 Man-in-the-Middle
CVE-2020-3356 Cisco Data Center Network Manager secondary_impact T1557 Man-in-the-Middle
CVE-2020-3349 Cisco Data Center Network Manager secondary_impact T1557 Man-in-the-Middle
CVE-2019-3754 Unity Operating Environment secondary_impact T1557 Man-in-the-Middle
CVE-2020-5336 RSA Archer secondary_impact T1557 Man-in-the-Middle
CVE-2018-15784 Dell Networking OS10 primary_impact T1557 Man-in-the-Middle
CVE-2018-11087 Spring AMQP primary_impact T1557 Man-in-the-Middle
CVE-2020-5269 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-11030 WordPress secondary_impact T1557 Man-in-the-Middle
CVE-2020-11023 jQuery secondary_impact T1557 Man-in-the-Middle
CVE-2020-5270 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-5264 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-11035 GLPI primary_impact T1557 Man-in-the-Middle
CVE-2020-11082 Kaminari secondary_impact T1557 Man-in-the-Middle
CVE-2020-15093 tough primary_impact T1557 Man-in-the-Middle
CVE-2020-5266 ps_linklist secondary_impact T1557 Man-in-the-Middle
CVE-2020-5271 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2019-6538 Medtronic Conexus Radio Frequency Telemetry Protocol primary_impact T1557 Man-in-the-Middle
CVE-2018-10610 LeviStudioU primary_impact T1557 Man-in-the-Middle
CVE-2018-14809 V-Server primary_impact T1557 Man-in-the-Middle
CVE-2012-3015 n/a uncategorized T1557 Man-in-the-Middle
CVE-2014-4077 n/a uncategorized T1557 Man-in-the-Middle
CVE-2018-0622 DHC Online Shop App for Android uncategorized T1557 Man-in-the-Middle
CVE-2015-7931 n/a uncategorized T1557 Man-in-the-Middle
CVE-2014-3566 n/a uncategorized T1557 Man-in-the-Middle
CVE-2018-16179 Mizuho Direct App for Android uncategorized T1557 Man-in-the-Middle
action.hacking.variety.MitM Man-in-the-middle attack. Child of 'Exploit vuln'. related-to T1557 Man-in-the-Middle
action.hacking.variety.Routing detour Routing detour. Child of 'Exploit vuln'. related-to T1557 Man-in-the-Middle
aws_rds AWS RDS technique_scores T1557 Man-in-the-Middle
Comments
AWS RDS and AWS RDS Proxy support TLS/SSL connections to database instances which protects against man-in-the-middle attacks. However, given that it does not support any sub-techniques, the mapping is given a score of Partial.
References
aws_config AWS Config technique_scores T1557 Man-in-the-Middle
Comments
The following AWS Config managed rules can identify configuration problems that should be fixed in order to ensure SSL/TLS encryption is enabled to protect network traffic: "acm-certificate-expiration-check" for nearly expired certificates in AWS Certificate Manager (ACM); "alb-http-to-https-redirection-check" for Application Load Balancer (ALB) HTTP listeners; "api-gw-ssl-enabled" for API Gateway REST API stages; "cloudfront-custom-ssl-certificate", "cloudfront-sni-enabled", and "cloudfront-viewer-policy-https", for Amazon CloudFront distributions; "elb-acm-certificate-required", "elb-custom-security-policy-ssl-check", "elb-predefined-security-policy-ssl-check", and "elb-tls-https-listeners-only" for Elastic Load Balancing (ELB) Classic Load Balancer listeners; "redshift-require-tls-ssl" for Amazon Redshift cluster connections to SQL clients; "s3-bucket-ssl-requests-only" for requests for S3 bucket contents; and "elasticsearch-node-to-node-encryption-check" for Amazon ElasticSearch Service node-to-node communications. All of these are run on configuration changes except "alb-http-to-https-redirection-check", which is run periodically. Coverage factor is partial for these rules, since they are specific to a subset of the available AWS services and can only mitigate behavior for adversaries who are unable to decrypt the relevant traffic. This control does not provide specific coverage for this technique's sub-techniques, resulting in an overall score of Minimal.
References
aws_iot_device_defender AWS IoT Device Defender technique_scores T1557 Man-in-the-Middle
Comments
The following AWS IoT Device Defender audit checks and corresponding mitigation actions can identify and resolve configuration problems that should be fixed in order to ensure SSL/TLS encryption is enabled and secure to protect network traffic to/from IoT devices: "CA certificate expiring" ("CA_CERTIFICATE_EXPIRING_CHECK" in the CLI and API), "CA certificate key quality" ("CA_CERTIFICATE_KEY_QUALITY_CHECK" in the CLI and API), and "CA certificate revoked but device certificates still active" ("REVOKED_CA_CERTIFICATE_STILL_ACTIVE_CHECK" in the CLI and API) can identify problems with certificate authority (CA) certificates being used for signing and support the "UPDATE_CA_CERTIFICATE" mitigation action which can resolve them. "Device certificate expiring" ("DEVICE_CERTIFICATE_EXPIRING_CHECK" in the CLI and API), "Device certificate key quality" ("DEVICE_CERTIFICATE_KEY_QUALITY_CHECK" in the CLI and API), "Device certificate shared" ("DEVICE_CERTIFICATE_SHARED_CHECK" in the CLI and API), and "Revoked device certificate still active" ("REVOKED_DEVICE_CERTIFICATE_STILL_ACTIVE_CHECK" in the CLI and API) can identify problems with IoT devices' certificates and support the "UPDATE_DEVICE_CERTIFICATE" and "ADD_THINGS_TO_THING_GROUP" mitigation actions which can resolve them. Coverage factor is partial for these checks and mitigations, since they are specific to IoT device communication and can only mitigate behavior for adversaries who are unable to decrypt the relevant traffic, resulting in an overall score of Partial. This control does not provide specific coverage for this technique's sub-techniques, resulting in an overall score of Minimal.
References
amazon_virtual_private_cloud Amazon Virtual Private Cloud technique_scores T1557 Man-in-the-Middle
Comments
The VPC service's support for the AWS Virtual Private Network (VPN) can be used to encrypt traffic traversing over untrusted networks which can mitigate Man-in-the-Middle attacks that manipulate network protocol data in transit. VPC Peering can also be utilized to route traffic privately between two VPCs which can reduce the Man-in-the-Middle attack surface. VPC Endpoints can also similarly reduce the attack surface of Man-in-the-Middle attacks by ensuring network traffic between a VPC and supported AWS services are not exposed to the Internet.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1557.002 ARP Cache Poisoning 24
T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay 17