Incomplete Model of Endpoint Features

Incomplete Base
Structure: Simple
Description

This vulnerability occurs when a security product, proxy, or monitoring system sits between endpoints but lacks a full understanding of what those endpoints can do or their current state. Because it's working with incomplete information, it can make wrong decisions, allowing malicious traffic to pass or incorrectly blocking legitimate requests.

Extended Description

Think of this like a bouncer at a club who only has a partial guest list. The security product (the bouncer) is supposed to control traffic between clients and servers (the guests and the club). However, if it doesn't fully understand the server's latest features, supported protocols, or authentication methods, it can't accurately judge what traffic is legitimate. This gap in knowledge means it might fail to detect novel attacks that exploit new server capabilities, or it could disrupt normal operations by blocking valid commands it doesn't recognize. For developers, the core issue is a mismatch between the security layer's assumptions and the actual application's behavior. This often happens when the intermediary uses static rules or outdated models that don't keep pace with application updates. To prevent this, your security components must dynamically learn or be explicitly configured with a complete profile of endpoint behaviors, including all valid states, API calls, and protocol extensions. Regularly synchronizing this model with endpoint changes is critical to maintaining effective protection.

Common Consequences 1
Scope: IntegrityOther

Impact: Unexpected StateVaries by Context

Demonstrative Examples 2
HTTP request smuggling is an attack against an intermediary such as a proxy. This attack works because the proxy expects the client to parse HTTP headers one way, but the client parses them differently.
Anti-virus products that reside on mail servers can suffer from this issue if they do not know how a mail client will handle a particular attachment. The product might treat an attachment type as safe, not knowing that the client's configuration treats it as executable.
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Related Weaknesses
Taxonomy Mapping
  • PLOVER
Notes
RelationshipThis can be related to interaction errors, although in some cases, one of the endpoints is not performing correctly according to specification.