Skip to main content

Phishing

Description

The application users are susceptible to phishing, a social engineering technique in which attackers present themselves as a legitimate entity that the victim trusts and request confidential information (usually credentials). These attacks are often possible due to improperly configured corporate email clients.

Impact

Mislead users to obtain information.

Recommendation

  • Use anti-spam controls to prevent mail from arriving.
  • Conduct awareness campaigns with users.

Threat

Anonymous attacker from the Internet.

Expected Remediation Time

⌚ 60 minutes.

Score

Default score using CVSS 3.1. It may change depending on the context of the vulnerability.

Base

  • Attack vector: N
  • Attack complexity: H
  • Privileges required: N
  • User interaction: R
  • Scope: U
  • Confidentiality: H
  • Integrity: N
  • Availability: N

Temporal

  • Exploit code madurity: X
  • Remediation level: X
  • Report confidence: X

Result

  • Vector string: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
  • Score:
    • Base: 5.3
    • Temporal: 5.3
  • Severity:
    • Base: Medium
    • Temporal: Medium

Code Examples

Compliant code

Application filters spam and conducts awareness campaigns to alert users of possible phishing attempts

Non compliant code

Application does not perform any spam filters

Requirements