Skip to content

Commit

Permalink
- More files
Browse files Browse the repository at this point in the history
  • Loading branch information
shivaccuknox committed Jan 8, 2024
1 parent 25805ef commit 9b6ae19
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,7 @@ references:
| [DNS Manipulation](threats/mitre/dnsManipulation.yaml) | An adversary can manipulate DNS requests to redirect network traffic and potentially reveal end user activity. | high | [accuknox/preventLocalDNSHijack](actions/accuknox/preventLocalDNSHijack), [mitre/integrityProtection](actions/mitre/integrityProtection), [mitre/networkTraffic](actions/mitre/networkTraffic) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) |
| [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | |[FGT1190](https://fight.mitre.org/techniques/FGT1190) |
| [Exploit Semi-public Facing Application](threats/mitre/exploitSemiPublicFacingApplication.yaml) | | High | [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT5029](https://fight.mitre.org/techniques/FGT5029) |
| [gNodeB Component Manipulation](threats/mitre/gNodeBComponentManipulation.yaml) | An adversary may compromise a component of gNodeB to affect radio network configuration | high | |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5032) |
| [Protocol Tunneling](threats/mitre/protocolTunnelling.yaml) | Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. | High | [mitre/encryptSensitiveInformation](actions/mitre/encryptSensitiveInformation), [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT1572.501](https://fight.mitre.org/techniques/FGT1572.501) |
| [Regitration of Malicious Network Functions](threats/mitre/registrationMaliciousNetworkFunctions.yaml) | An adversary, such as an insider to the MNO or vendor, could install a malicious NF into the core network, in order to launch other attacks or get access to information. | high | [mitre/networkSegmentation](actions/mitre/networkSegmentation) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) |
| [Rogue xApps unauthorized access](threats/mitre/rogueXappsUnauthAccess.yaml) | Malicious xApps may gain unauthorized access to near-RT RIC and E2 nodes | High | [mitre/credentialAccessProtection](actions/mitre/credentialAccessProtection), [mitre/networkSegmentation](actions/mitre/networkSegmentation) |[FGT5034](https://fight.mitre.org/techniques/FGT5034) |
Expand Down
12 changes: 12 additions & 0 deletions threats/mitre/gNodeBComponentManipulation.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
title: gNodeB Component Manipulation
description: An adversary may compromise a component of gNodeB to affect radio network configuration
severity: high
tags: [mitre, initial-access]
detectionMethods:
mitigationMethods:
securityActions:
securityIntentBinding: sample-si-binding.yaml
preDeploymentConsiderations: #Anything that can be done in CI/CD pipelines that can alleviate this threat
references:
- name: MITRE FiGHT
url: https://fight.mitre.org/techniques/FGT5032

0 comments on commit 9b6ae19

Please sign in to comment.