CAPEC-36: Using Unpublished Interfaces or Functionality
An adversary searches for and invokes interfaces or functionality that the target system designers did not intend to be publicly available. If interfaces fail to authenticate requests, the attacker may be able to invoke functionality they are not authorized for.
Severity
High
Likelihood
Medium
17
/ 100
low-risk
Active Threat
14/50 · Low
Exploit Availability
3/50 · Minimal