An initial assessment of the security vulnerabilities that emerge from TAXII’s mode ofoperation as well as a non-exhaustive enumeration of vulnerabilities that may occur in itsimplementations.
My recent vulnerability assessment of the TAXII protocol may be downloaded here