logo

114 Phishing


Description

The application users are susceptible to phishing, a social engineering technique in which attackers present themselves as a legitimate entity that the victim trusts and request confidential information (usually credentials). These attacks are often possible due to improperly configured corporate email clients.


Impact

Mislead users to obtain information.


Recommendation

- Use anti-spam controls to prevent mail from arriving. - Conduct awareness campaigns with users.


Threat

Anonymous attacker from the Internet.


Expected Remediation Time

60 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: A
  • Confidentiality (VC): H
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Fixes


Last updated

2024/02/13