CAPEC-176: Configuration/Environment Manipulation

ID CAPEC-176
Typical Severity Medium
Status Draft

An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.

https://capec.mitre.org/data/definitions/176.html

Weaknesses

# ID Name Type
CWE-15 External Control of System or Configuration Setting weakness
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection weakness
CWE-1234 Hardware Internal or Debug Modes Allow Override of Locks weakness
CWE-1304 Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation weakness
CWE-1328 Security Version Number Mutable to Older Versions weakness

Taxonomiy Mapping

Type # ID Name
OWASP Attacks Setting Manipulation
Loading...