CAPEC-187: Malicious Automated Software Update via Redirection
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source of update or patch content. This type of weakness typically results from authentication mechanisms which can be defeated, allowing a hostile server to satisfy the criteria that establish a trust relationship. The second weakness is a systemic failure to validate the identity and integrity of code downloaded from a remote location, hence the inability to distinguish malicious code from a legitimate update.
后果影响
影响范围: Access Control Availability Confidentiality
技术影响: Execute Unauthorized Commands
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1072 | Software Deployment Tools |