CAPEC-679: Exploitation of Improperly Configured or Implemented Memory Protections

Detailed Draft 严重程度: Very High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

前提条件

  • Access to the hardware being leveraged.

所需技能

Medium Ability to craft malicious code to inject into the memory region.
High Intricate knowledge of memory structures.

后果影响

影响范围: Integrity

技术影响: Modify Data

影响范围: Confidentiality

技术影响: Read Data

影响范围: Confidentiality Integrity Availability

技术影响: Execute Unauthorized Commands

说明: Run Arbitrary Code

影响范围: Confidentiality Access Control Authorization

技术影响: Gain Privileges

缓解措施

Ensure that protected and unprotected memory ranges are isolated and do not overlap.

If memory regions must overlap, leverage memory priority schemes if memory regions can overlap.

Ensure that original and mirrored memory regions apply the same protections.

Ensure immutable code or data is programmed into ROM or write-once memory.

关键信息

CAPEC ID: CAPEC-679

抽象级别: Detailed

状态: Draft

典型严重程度: Very High

攻击可能性: Medium

相关攻击模式