6. of Spoofing
An attacker can spoof a server because identifiers aren’t stored on the client and checked for consistency on reconnection (that is, there’s no key persistence).
Threat |
|
You are not checking known hosts for Secure Shell (SSH) connections because you have the |
|
CAPEC |
CAPEC-195 - Principal Spoof |
ASVS |
9.2.1 - Ensure you’re verifying TLS certificates and internal certificate authority certificates or self-signed certificates are also in your trust store |
CWE |
CWE-295 - Improper Certificate... |