CAPEC-65: Sniff Application Code
An adversary passively sniffs network communications and captures application code bound for an authorized client. Once obtained, they can use it as-is, or through reverse-engineering glean sensitive information or exploit the trust relationship between the client and server. Such code may belong to a dynamic update to the client, a patch being applied to a client component or any such interaction where the client is authorized to communicate with the server.
Severity
High
Likelihood
Low
3
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
1/50 · Minimal