The product's behaviors indicate important differences that may be observed by unauthorized actors in a way that reveals (1) its internal state or decision process, or (2) differences from other products with equivalent functionality.
Ideally, a product should provide as little information about its internal operations as possible. Otherwise, attackers could use knowledge of these internal operations to simplify or optimize their attack. In some cases, behavioral discrepancies can be used by attackers to form a side channel.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2002-0208
Product modifies TCP/IP stack and ICMP error messages in unusual ways that show the product is in use.
CVE: CVE-2004-2252
Behavioral infoleak by responding to SYN-FIN packets.
Phase | Note |
---|---|
Architecture and Design | N/A |
Implementation | N/A |
N/A