CAPEC-634: Probe Audio and Video Peripherals
ID
CAPEC-634
Typical Severity
High
Likelihood Of Attack
Low
Status
Stable
The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-267 | Privilege Defined With Unsafe Actions | weakness |
Taxonomiy Mapping
Type | # ID | Name |
---|---|---|
ATTACK | 1123 | Audio Capture |
ATTACK | 1125 | Video Capture |