CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation
Detailed
Stable
严重程度: High
攻击可能性: Medium
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
前提条件
- Access to the configuration management system during deployment or currently deployed at a victim location. This access is often obtained via insider access or by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.
后果影响
影响范围: Authorization
技术影响: Execute Unauthorized Commands
缓解措施
Assess software during development and prior to deployment to ensure that it functions as intended and without any malicious functionality.
Leverage anti-virus products to detect and quarantine software with known virus.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1195.001 | Supply Chain Compromise: Compromise Software Dependencies and Development Tools |