CAPEC-187: Malicious Automated Software Update via Redirection

Detailed Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source of update or patch content. This type of weakness typically results from authentication mechanisms which can be defeated, allowing a hostile server to satisfy the criteria that establish a trust relationship. The second weakness is a systemic failure to validate the identity and integrity of code downloaded from a remote location, hence the inability to distinguish malicious code from a legitimate update.

后果影响

影响范围: Access Control Availability Confidentiality

技术影响: Execute Unauthorized Commands

分类映射

分类名称 条目ID 条目名称
ATTACK 1072 Software Deployment Tools
关键信息

CAPEC ID: CAPEC-187

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式
相关CWE弱点