An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.
Sources:
NISTIR 7711
under Man-In-The-Middle