CAPEC-444: Development Alteration

Standard Stable 严重程度: High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary modifies a technology, product, or component during its development to acheive a negative impact once the system is deployed. The goal of the adversary is to modify the system in such a way that the negative impact can be leveraged when the system is later deployed. Development alteration attacks may include attacks that insert malicious logic into the system's software, modify or replace hardware components, and other attacks which negatively impact the system during development. These attacks generally require insider access to modify source code or to tamper with hardware components. The product is then delivered to the user where the negative impact can be leveraged at a later time.

前提条件

  • Access to the system during the development phase to alter and/or modify software and hardware components. This access is often obtained via insider access or by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.

后果影响

影响范围: Authorization

技术影响: Execute Unauthorized Commands

影响范围: Availability

技术影响: Unreliable Execution

影响范围: Integrity

技术影响: Alter Execution Logic

缓解措施

Assess software and software components during development and prior to deployment to ensure that they function as intended and without any malicious functionality.

关键信息

CAPEC ID: CAPEC-444

抽象级别: Standard

状态: Stable

典型严重程度: High

攻击可能性: Medium

相关攻击模式