An attacker obstructs the interactions between system components. By interrupting or disabling these interactions, an adversary can often force the system into a degraded state or cause the system to stop working as intended. This can cause the system components to be unavailable until the obstruction mitigated.
|
|
| ID | CAPEC-607 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 607 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | |
| Typical Severity | |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | |
| Skills Required | |
| Resources Required | |
| Indicators | |
| Consequences | ::SCOPE:Availability:TECHNICAL IMPACT:Resource Consumption:: |
| Mitigations | |
| Example Instances | |
| Related Weaknesses | |
| Taxonomy Mappings | |
| Notes | |