CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation

Detailed Stable 严重程度: High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

前提条件

  • Access to the configuration management system during deployment or currently deployed at a victim location. This access is often obtained via insider access or by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.

后果影响

影响范围: Authorization

技术影响: Execute Unauthorized Commands

缓解措施

Assess software during development and prior to deployment to ensure that it functions as intended and without any malicious functionality.

Leverage anti-virus products to detect and quarantine software with known virus.

分类映射

分类名称 条目ID 条目名称
ATTACK 1195.001 Supply Chain Compromise: Compromise Software Dependencies and Development Tools
关键信息

CAPEC ID: CAPEC-445

抽象级别: Detailed

状态: Stable

典型严重程度: High

攻击可能性: Medium

相关攻击模式